Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <7a0cfd0a-17fa-f2aa-00ed-1664b5f1701c@apache.org>
Date: Thu, 14 Aug 2025 11:41:18 +0000
From: Daniel Gaspar <dpgaspar@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-55674: Apache Superset: Improper SQL authorisation, parse
 not checking for specific engine functions 

Severity: 

Affected versions:

- Apache Superset before 5.0.0

Description:

A bypass of the DISALLOWED_SQL_FUNCTIONS security feature in Apache Superset allows for the execution of blocked SQL functions. An attacker can use a special inline block to circumvent the denylist. This allows a user with SQL Lab access to execute functions that were intended to be disabled, leading to the disclosure of sensitive database information like the software version.

This issue affects Apache Superset: before 5.0.0.

Users are recommended to upgrade to version 5.0.0, which fixes the issue.

Credit:

Pedro Sousa (coordinator)
Beto Dealmeida (remediation developer)
d47sec from NCS Viet Nam (reporter)

References:

https://www.cve.org/CVERecord?id=CVE-2025-55674

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.