CVE-2025-57735

Severity
9.1CRITICAL
EPSS
0.0%
top 98.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9

Description

When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was intercepted. In Airflow 3.2 we implemented the mechanism that implements token invalidation at logout. Users who are concerned about the logout scenario and possibility of intercepting the tokens, should upgrade to Airflow 3.2+ Users are recommended to upgrade to version 3.2.0, which fixes this issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2

Affected Packages2 packages

PyPIapache-airflow3.0.03.2.0

🔴Vulnerability Details

3
GHSA
GHSA-c92r-g8j5-vhcx: When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was inter2026-04-09
GHSA
Apache Airflow: JWT token still valid after logout2026-04-09
CVEList
Apache Airflow: Airflow Logout Not Invalidating JWT2026-04-09