Impact
An input validation flaw (CWE‑863) in Apache Superset allows an authenticated user with SQLLab access to craft SQL statements that bypass the system’s read‑only check when connected to PostgreSQL. This lets the attacker execute data manipulation operations such as INSERT, UPDATE, or DELETE despite the intended read‑only restriction, resulting in unauthorized modifications to data and compromising data integrity.
Affected Systems
Apache Superset versions prior to 6.0.0 deployed at any organization using a PostgreSQL database with SQLLab enabled. The vulnerability applies to all instances that expose SQLLab to authenticated users.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.1, indicating high severity. The EPSS score of less than 1% suggests exploitation is unlikely at this time, and the issue is not listed in the CISA KEV catalog. Nonetheless, any user with SQLLab permissions can exploit the flaw by submitting a specially crafted query, leading to data modification. The attack requires authentication but no special privileges beyond SQLLab and can be performed from the user’s own session. Because the CVSS score is high, organizations with exposed SQLLab should treat this as a critical issue if they cannot immediately patch.
OpenCVE Enrichment
Github GHSA