|
|
Message-ID: <0ff3b90b-81fd-c633-91a4-e40453f7b4d1@apache.org> Date: Tue, 24 Feb 2026 09:35:43 +0000 From: Daniel Gaspar <dpgaspar@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2026-23982: Apache Superset: Improper Authorization in Dataset Creation Allows Access Control Bypass Severity: Affected versions: - Apache Superset 0.0.0 before 6.0.0 Description: An Improper Authorization vulnerability exists in Apache Superset that allows a low-privileged user to bypass data access controls. When creating a dataset, Superset enforces permission checks to prevent users from querying unauthorized data. However, an authenticated attacker with permissions to write datasets and read charts can bypass these checks by overwriting the SQL query of an existing dataset. This issue affects Apache Superset: before 6.0.0. Users are recommended to upgrade to version 6.0.0, which fixes the issue. Credit: River Koh (reporter) Daniel Gaspar (remediation developer) References: https://superset.apache.org https://www.cve.org/CVERecord?id=CVE-2026-23982
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.