Description
An Improper Input Validation vulnerability exists in Apache Superset that allows an authenticated user with SQLLab access to bypass the read-only verification check when using a PostgreSQL database connection.
While the system effectively blocks standard Data Manipulation Language (DML) statements (e.g., INSERT, UPDATE, DELETE) on read-only connections, it fails to detect them in specially crafted SQL statements.

This issue affects Apache Superset: before 6.0.0.

Users are recommended to upgrade to version 6.0.0, which fixes the issue.
Published: 2026-02-24
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data modification (data integrity breach)
Action: Patch Now
AI Analysis

Impact

An input validation flaw (CWE‑863) in Apache Superset allows an authenticated user with SQLLab access to craft SQL statements that bypass the system’s read‑only check when connected to PostgreSQL. This lets the attacker execute data manipulation operations such as INSERT, UPDATE, or DELETE despite the intended read‑only restriction, resulting in unauthorized modifications to data and compromising data integrity.

Affected Systems

Apache Superset versions prior to 6.0.0 deployed at any organization using a PostgreSQL database with SQLLab enabled. The vulnerability applies to all instances that expose SQLLab to authenticated users.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.1, indicating high severity. The EPSS score of less than 1% suggests exploitation is unlikely at this time, and the issue is not listed in the CISA KEV catalog. Nonetheless, any user with SQLLab permissions can exploit the flaw by submitting a specially crafted query, leading to data modification. The attack requires authentication but no special privileges beyond SQLLab and can be performed from the user’s own session. Because the CVSS score is high, organizations with exposed SQLLab should treat this as a critical issue if they cannot immediately patch.

Generated by OpenCVE AI on April 17, 2026 at 15:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache Superset to version 6.0.0 or later to apply the vendor patch that restores proper read‑only enforcement.
  • Restrict SQLLab access to only trusted users or disable the feature entirely for accounts that do not need database query capabilities.
  • Monitor database logs for unexpected DML activity and implement alerts to detect potential exploitation until a patch is applied.

Generated by OpenCVE AI on April 17, 2026 at 15:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mwf2-qr4v-94h2 Apache Superset: Read-Only Bypass via Improper Input Validation on PostgreSQL Connections
History

Thu, 26 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache superset
Vendors & Products Apache
Apache superset

Tue, 24 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
References

Tue, 24 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
Description An Improper Input Validation vulnerability exists in Apache Superset that allows an authenticated user with SQLLab access to bypass the read-only verification check when using a PostgreSQL database connection. While the system effectively blocks standard Data Manipulation Language (DML) statements (e.g., INSERT, UPDATE, DELETE) on read-only connections, it fails to detect them in specially crafted SQL statements. This issue affects Apache Superset: before 6.0.0. Users are recommended to upgrade to version 6.0.0, which fixes the issue.
Title Apache Superset: SQLLab Read-Only Bypass on PostgreSQL
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-02-24T18:19:39.664Z

Reserved: 2026-01-19T17:13:41.800Z

Link: CVE-2026-23984

cve-icon Vulnrichment

Updated: 2026-02-24T18:19:39.664Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T14:16:23.307

Modified: 2026-02-26T16:25:58.613

Link: CVE-2026-23984

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:00:11Z

Weaknesses