apache-airflow-providers-keycloak: Missing OAuth 2.0 State and PKCE Enables Login CSRF and Session Fixation
Moderate severity
GitHub Reviewed
Published
Apr 18, 2026
to the GitHub Advisory Database
•
Updated Apr 22, 2026
Package
Affected versions
>= 0.0.1, < 0.7.0
Patched versions
0.7.0
Description
Published by the National Vulnerability Database
Apr 18, 2026
Published to the GitHub Advisory Database
Apr 18, 2026
Last updated
Apr 22, 2026
Reviewed
Apr 22, 2026
The Keycloak authentication manager in
apache-airflow-providers-keycloakdid not generate or validate the OAuth 2.0stateparameter on the login / login-callback flow, and did not use PKCE. An attacker with a Keycloak account in the same realm could deliver a crafted callback URL to a victim's browser and cause the victim to be logged into the attacker's Airflow session (login-CSRF / session fixation), where any credentials the victim subsequently stored in Airflow Connections would be harvestable by the attacker. Users are advised to upgradeapache-airflow-providers-keycloakto 0.7.0 or later.References