oss-sec mailing list archives
CVE-2026-40948: Apache Airflow Keycloak Provider: OAuth Login CSRF — Missing State Parameter in Keycloak Auth Manager
From: Jarek Potiuk <potiuk () apache org>
Date: Fri, 17 Apr 2026 17:00:40 +0000
Severity: low Affected versions: - Apache Airflow Keycloak Provider (apache-airflow-providers-keycloak) 0.0.1 before 0.7.0 Description: The Keycloak authentication manager in `apache-airflow-providers-keycloak` did not generate or validate the OAuth 2.0 `state` parameter on the login / login-callback flow, and did not use PKCE. An attacker with a Keycloak account in the same realm could deliver a crafted callback URL to a victim's browser and cause the victim to be logged into the attacker's Airflow session (login-CSRF / session fixation), where any credentials the victim subsequently stored in Airflow Connections would be harvestable by the attacker. Users are advised to upgrade `apache-airflow-providers-keycloak` to 0.7.0 or later. Credit: Haruki Oyama (Waseda University) (finder) Aritra Basu (remediation developer) References: https://github.com/apache/airflow/pull/64114 https://airflow.apache.org/ https://www.cve.org/CVERecord?id=CVE-2026-40948
Current thread:
- CVE-2026-40948: Apache Airflow Keycloak Provider: OAuth Login CSRF — Missing State Parameter in Keycloak Auth Manager Jarek Potiuk (Apr 17)
