Skip to main content
Mallory

Apache Airflow 3.0.x Exposed JWTs Through Logout and Logging Flaws

identity-authentication-vulnerabilitywidely-deployed-product-advisoryleaked-secret-api-key
Updated April 16, 2026 at 05:05 PM2 sources
Share:
Apache Airflow 3.0.x Exposed JWTs Through Logout and Logging Flaws

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Apache disclosed two JWT-related vulnerabilities in Apache Airflow affecting versions 3.0.0 before 3.2.0. The first, CVE-2025-57735, is a low-severity flaw in which logout did not invalidate authentication JWTs, leaving intercepted tokens usable after a user signed out. The second, CVE-2026-31987, is a moderate-severity issue that caused task JWTs to appear in logs, potentially exposing credentials to users who could then act as DAG authors.

Apache said both issues are fixed in Airflow 3.2.0, which adds token invalidation on logout and removes the logging exposure. Organizations running affected releases have been advised to upgrade to 3.2.0 or later, particularly where shared log access or concerns about token reuse could increase the risk of unauthorized access and privilege escalation.

Timeline

  1. Apr 16, 2026

    Apache discloses CVE-2026-31987 for JWT tokens exposed in Airflow logs

    Apache disclosed a moderate-severity vulnerability affecting Airflow versions 3.0.0 before 3.2.0 in which JWT tokens used by tasks could appear in logs. Apache said the issue could enable UI users to act as DAG authors and advised upgrading to Airflow 3.2.0.

  2. Apr 9, 2026

    Apache discloses CVE-2025-57735 affecting Airflow JWT logout behavior

    Apache disclosed a low-severity vulnerability in Apache Airflow where authentication JWTs were not invalidated on logout, creating a risk that intercepted tokens could be reused. Users were advised to upgrade to Airflow 3.2.0 or later.

  3. Apr 9, 2026

    Apache Airflow 3.2.0 fixes JWT logout invalidation issue

    Apache stated that Airflow 3.2 introduced token invalidation on logout, addressing CVE-2025-57735, which affected versions 3.0.0 before 3.2.0 and allowed JWTs to remain valid after logout.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

April 16, 2026 at 12:00 AM

Related Stories

Apache Airflow Flaws Enable Security Bypass and Multiple Additional Vulnerabilities

Apache Airflow Flaws Enable Security Bypass and Multiple Additional Vulnerabilities

German authorities issued advisories for **Apache Airflow** covering a vulnerability that can bypass security measures and a separate notice for **multiple vulnerabilities** affecting the workflow orchestration platform. The alerts indicate that Airflow deployments may be exposed to weaknesses that undermine intended protections and introduce additional security risk across affected environments. Organizations using Apache Airflow should review the referenced advisories, identify affected versions, and prioritize vendor-recommended updates or mitigations. Because Airflow is commonly used to manage automated data pipelines and scheduled jobs, successful exploitation could weaken access controls or expose connected systems and workflows to further compromise.

1 weeks ago
Apache Airflow fixes XCom-related code execution flaws in deserialization and example DAGs

Apache Airflow fixes XCom-related code execution flaws in deserialization and example DAGs

Apache disclosed two low-severity code execution issues in **Apache Airflow** tied to its XCom mechanism and addressed them in **Airflow 3.2.0**. **CVE-2026-33858** affects Airflow versions `3.1.8` before `3.2.0` and stems from unsafe deserialization in the XCom API, where legacy serialization keys `__type` and `__var` can bypass protections and let a DAG author craft payloads that execute arbitrary code in the webserver context. Apache said the flaw was rated low severity because DAG authors are already treated as highly trusted users. Apache also disclosed **CVE-2025-54550**, a low-severity remote code execution issue involving the documented `example_xcom` DAG pattern. The vulnerable pattern read XCom values in a way that could allow a UI user with permission to modify XComs to trigger arbitrary code execution on a worker through a race condition. Apache said official releases were not directly affected because example DAGs are not meant to be enabled in production, but organizations that copied the documented approach could reproduce the weakness in their own deployments; updated documentation in **Airflow 3.2.0** provides a safer example.

2 weeks ago
Privilege Escalation Vulnerability in Apache StreamPipes (CVE-2025-47411)

Privilege Escalation Vulnerability in Apache StreamPipes (CVE-2025-47411)

A critical privilege escalation vulnerability, tracked as CVE-2025-47411, was discovered in Apache StreamPipes versions 0.69.0 through 0.97.0. The flaw allows legitimate non-administrator users to manipulate JWT tokens and escalate their privileges by swapping their username for an existing administrator account, thereby gaining full administrative control of the application. This vulnerability stems from a flawed user ID creation mechanism and poses significant risks, as attackers can bypass access controls without advanced technical skills or external tools. Once administrative access is obtained, attackers can access sensitive data, modify system configurations, and potentially compromise the entire data streaming infrastructure. The vulnerability is particularly concerning for organizations using StreamPipes to process proprietary or operational data, and it introduces supply chain risks if integrated with critical business systems. Apache has addressed the issue by releasing version 0.98.0, urging all affected users to update immediately to mitigate the risk.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.