CVE-2025-57735
Received Received - Intake
JWT Token Reuse Vulnerability in Apache Airflow Before

Publication date: 2026-04-09

Last updated on: 2026-04-17

Assigner: Apache Software Foundation

Description
When user logged out, the JWT token the user had authtenticated with was not invalidated, which could lead to reuse of that token in case it was intercepted. In Airflow 3.2 we implemented the mechanism that implements token invalidation at logout. Users who are concerned about the logout scenario and possibility of intercepting the tokens, should upgrade to Airflow 3.2+ Users are recommended to upgrade to version 3.2.0, which fixes this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-17
Generated
2026-05-07
AI Q&A
2026-04-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apache airflow From 3.0.0 (inc) to 3.2.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-613 According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs because when a user logs out, the JWT token they used for authentication is not invalidated. This means that if the token is intercepted by an attacker, it could be reused to gain unauthorized access.

The fix implemented in Apache Airflow 3.2 introduces a mechanism to revoke JWT tokens upon logout by storing the token identifiers (JTIs) of revoked tokens in a database table. Each authenticated request checks if the token has been revoked, denying access if so, thereby preventing token reuse after logout.


How can this vulnerability impact me? :

If you are using a vulnerable version of Apache Airflow, an attacker who intercepts your JWT token could reuse it even after you have logged out, potentially gaining unauthorized access to your system.

This could lead to unauthorized actions being performed under your user identity, compromising the security and integrity of your workflows and data.

Upgrading to Airflow 3.2 or later mitigates this risk by ensuring tokens are invalidated immediately upon logout.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves JWT tokens not being invalidated upon user logout, allowing potential reuse if intercepted. Detection involves verifying whether revoked tokens are properly tracked and denied access.

You can check the presence and contents of the `revoked_token` database table introduced in Airflow 3.2, which stores JWT token identifiers (JTIs) of revoked tokens.

To detect misuse or reuse of tokens, monitor authentication logs for requests using tokens whose JTIs appear in the revoked_token table.

Suggested commands (assuming access to the Airflow database):

  • Query the revoked_token table to list revoked tokens: `SELECT * FROM revoked_token;`
  • Check authentication logs for repeated use of revoked JTIs or suspicious token reuse patterns.
  • Verify that your Airflow version is 3.2 or higher, as earlier versions do not implement token invalidation on logout.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade Apache Airflow to version 3.2.0 or later, which implements JWT token invalidation upon user logout.

This upgrade introduces a mechanism that stores revoked token identifiers in a dedicated database table and denies access for revoked tokens, preventing token reuse.

Additionally, ensure that your authentication tokens are handled securely by the backend, using httpOnly cookies as implemented in the updated Airflow UI authentication.

Review your deployment to confirm that HTTPS termination and proxy configurations (e.g., NGINX) correctly handle secure redirects and headers to avoid exposing tokens.

Monitor your authentication logs for any suspicious token reuse until the upgrade is applied.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability involves the failure to invalidate JWT tokens upon user logout, which could allow intercepted tokens to be reused. Such a flaw can impact compliance with standards like GDPR and HIPAA that require secure handling of authentication tokens and protection of user sessions to prevent unauthorized access.

By not invalidating tokens on logout, there is an increased risk of unauthorized access if tokens are intercepted, potentially leading to data breaches or unauthorized data access, which are critical concerns under regulations like GDPR and HIPAA.

The fix implemented in Apache Airflow 3.2 and later versions introduces token revocation on logout, improving security by preventing token reuse and thereby helping organizations maintain compliance with these regulations by reducing the risk of unauthorized access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart