Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. apache-airflow
  4. ›
  5. CVE-2025-57735

CVE-2025-57735: Apache Airflow: JWT token still valid after logout

April 9, 2026 (updated April 10, 2026)

When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was intercepted. In Airflow 3.2 we implemented the mechanism that implements token invalidation at logout. Users who are concerned about the logout scenario and possibility of intercepting the tokens, should upgrade to Airflow 3.2+

Users are recommended to upgrade to version 3.2.0, which fixes this issue.

References

  • github.com/advisories/GHSA-c92r-g8j5-vhcx
  • github.com/apache/airflow
  • github.com/apache/airflow/pull/56633
  • github.com/apache/airflow/pull/61339
  • lists.apache.org/thread/ovn8mpd8zkc604hojt7x3wsw3kc60x98
  • nvd.nist.gov/vuln/detail/CVE-2025-57735

Code Behaviors & Features

Detect and mitigate CVE-2025-57735 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.0.0 before 3.2.0

Fixed versions

  • 3.2.0

Solution

Upgrade to version 3.2.0 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-613: Insufficient Session Expiration

Source file

pypi/apache-airflow/CVE-2025-57735.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:31 +0000.