|
|
Message-ID: <8d265a92-6a79-c836-54d8-650094bfcc49@apache.org> Date: Tue, 24 Feb 2026 09:42:35 +0000 From: Daniel Gaspar <dpgaspar@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2026-23983: Apache Superset: Sensitive Data Exposure via REST API (disabled by default) Severity: Affected versions: - Apache Superset 0.0.0 before 6.0.0 Description: A Sensitive Data Exposure vulnerability exists in Apache Superset allowing authenticated users to retrieve sensitive user information. The Tag endpoint (disabled by default) allows users to retrieve a list of objects associated with a specific tag. When these associated objects include Users, the API response improperly serializes and returns sensitive fields, including password hashes (pbkdf2), email addresses, and login statistics. This vulnerability allows authenticated users with low privileges (e.g., Gamma role) to view sensitive authentication data This issue affects Apache Superset: before 6.0.0. Users are recommended to upgrade to version 6.0.0, which fixes the issue or make sure TAGGING_SYSTEM is False (Apache Superset current default) Credit: Krzysztof Maurek (reporter) Daniel Gaspar (remediation developer) References: https://superset.apache.org https://www.cve.org/CVERecord?id=CVE-2026-23983
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.