DNA View

CVE-2026-40948

Low
Low Medium High Critical
CVSS Score
Published: Apr 18, 2026
Last Modified: Apr 18, 2026

Vulnerability Description

The Keycloak authentication manager in `apache-airflow-providers-keycloak` did not generate or validate the OAuth 2.0 `state` parameter on the login / login-callback flow, and did not use PKCE. An attacker with a Keycloak account in the same realm could deliver a crafted callback URL to a victim's browser and cause the victim to be logged into the attacker's Airflow session (login-CSRF / session fixation), where any credentials the victim subsequently stored in Airflow Connections would be harvestable by the attacker. Users are advised to upgrade `apache-airflow-providers-keycloak` to 0.7.0 or later.

Severity Details

out of 10.0
Low

Weakness Type (CWE)

CWE-352 Top 25 #4

Cross-Site Request Forgery (CSRF)

Description
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Exploit Likelihood
Medium
Typical Severity
High
OWASP Top 10
A01:2021-Broken Access Control
Abstraction Level
Compound

Key Information

Published Date
April 18, 2026