CVE-2025-57735
JWT Token Reuse Vulnerability in Apache Airflow Before
Publication date: 2026-04-09
Last updated on: 2026-04-17
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | airflow | From 3.0.0 (inc) to 3.2.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-613 | According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization." |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs because when a user logs out, the JWT token they used for authentication is not invalidated. This means that if the token is intercepted by an attacker, it could be reused to gain unauthorized access.
The fix implemented in Apache Airflow 3.2 introduces a mechanism to revoke JWT tokens upon logout by storing the token identifiers (JTIs) of revoked tokens in a database table. Each authenticated request checks if the token has been revoked, denying access if so, thereby preventing token reuse after logout.
How can this vulnerability impact me? :
If you are using a vulnerable version of Apache Airflow, an attacker who intercepts your JWT token could reuse it even after you have logged out, potentially gaining unauthorized access to your system.
This could lead to unauthorized actions being performed under your user identity, compromising the security and integrity of your workflows and data.
Upgrading to Airflow 3.2 or later mitigates this risk by ensuring tokens are invalidated immediately upon logout.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves JWT tokens not being invalidated upon user logout, allowing potential reuse if intercepted. Detection involves verifying whether revoked tokens are properly tracked and denied access.
You can check the presence and contents of the `revoked_token` database table introduced in Airflow 3.2, which stores JWT token identifiers (JTIs) of revoked tokens.
To detect misuse or reuse of tokens, monitor authentication logs for requests using tokens whose JTIs appear in the revoked_token table.
Suggested commands (assuming access to the Airflow database):
- Query the revoked_token table to list revoked tokens: `SELECT * FROM revoked_token;`
- Check authentication logs for repeated use of revoked JTIs or suspicious token reuse patterns.
- Verify that your Airflow version is 3.2 or higher, as earlier versions do not implement token invalidation on logout.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to upgrade Apache Airflow to version 3.2.0 or later, which implements JWT token invalidation upon user logout.
This upgrade introduces a mechanism that stores revoked token identifiers in a dedicated database table and denies access for revoked tokens, preventing token reuse.
Additionally, ensure that your authentication tokens are handled securely by the backend, using httpOnly cookies as implemented in the updated Airflow UI authentication.
Review your deployment to confirm that HTTPS termination and proxy configurations (e.g., NGINX) correctly handle secure redirects and headers to avoid exposing tokens.
Monitor your authentication logs for any suspicious token reuse until the upgrade is applied.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability involves the failure to invalidate JWT tokens upon user logout, which could allow intercepted tokens to be reused. Such a flaw can impact compliance with standards like GDPR and HIPAA that require secure handling of authentication tokens and protection of user sessions to prevent unauthorized access.
By not invalidating tokens on logout, there is an increased risk of unauthorized access if tokens are intercepted, potentially leading to data breaches or unauthorized data access, which are critical concerns under regulations like GDPR and HIPAA.
The fix implemented in Apache Airflow 3.2 and later versions introduces token revocation on logout, improving security by preventing token reuse and thereby helping organizations maintain compliance with these regulations by reducing the risk of unauthorized access.