Impact
Apache Superset allows users to run arbitrary SQL queries against backend databases through SQL Lab and chart creation. A configurable list of disallowed SQL functions is intended to prevent execution of sensitive operations. For ClickHouse, this list was incomplete, letting certain privileged functions run unfiltered. This flaw can lead to unauthorized disclosure of sensitive data stored in the ClickHouse database. The weakness is a classic example of SQL injection (CWE‑89), where bypassing filters enables exposure of protected information.
Affected Systems
The vulnerability applies to Apache Superset deployments running any version prior to 4.1.2, regardless of the specific environment or hosting configuration. Systems using the ClickHouse engine in Superset should verify whether they fall under the affected version range.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation at the time of analysis. The flaw is not listed in the CISA KEV catalog, so there is no current evidence of large‑scale exploitation. Attackers would likely need user access to Superset’s SQL Lab with the ability to input custom queries. If such access is granted, they can craft queries that invoke the uncovered ClickHouse functions and retrieve sensitive data. The risk escalates if privileged users or anonymous access are allowed to submit queries.
OpenCVE Enrichment
Github GHSA