Export limit exceeded: 349838 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Export limit exceeded: 349838 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Export limit exceeded: 349838 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (1 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2026-40948 | 1 Apache | 2 Airflow, Apache-airflow-providers-keycloak | 2026-05-11 | 5.4 Medium |
| The Keycloak authentication manager in `apache-airflow-providers-keycloak` did not generate or validate the OAuth 2.0 `state` parameter on the login / login-callback flow, and did not use PKCE. An attacker with a Keycloak account in the same realm could deliver a crafted callback URL to a victim's browser and cause the victim to be logged into the attacker's Airflow session (login-CSRF / session fixation), where any credentials the victim subsequently stored in Airflow Connections would be harvestable by the attacker. Users are advised to upgrade `apache-airflow-providers-keycloak` to 0.7.0 or later. | ||||
Page 1 of 1.