In AWS Auth manager, the origin of the SAML authentication has been used as provided by the client and not verified against the actual instance URL.
This allowed to gain access to different instances with potentially different access controls by reusing SAML response from other instances.
You should upgrade to 9.22.0 version of provider if you use AWS Auth Manager.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Mar 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 09 Mar 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In AWS Auth manager, the origin of the SAML authentication has been used as provided by the client and not verified against the actual instance URL. This allowed to gain access to different instances with potentially different access controls by reusing SAML response from other instances. You should upgrade to 9.22.0 version of provider if you use AWS Auth Manager. | |
| Title | Apache Airflow AWS Auth Manager - Host Header Injection Leading to SAML Authentication Bypass | |
| Weaknesses | CWE-346 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-03-09T12:09:58.818Z
Reserved: 2026-02-03T09:59:31.342Z
Link: CVE-2026-25604
No data.
Status : Awaiting Analysis
Published: 2026-03-09T11:16:06.077
Modified: 2026-03-09T13:35:07.393
Link: CVE-2026-25604
No data.
OpenCVE Enrichment
No data.