An authenticated malicious actor using specially crafted requests could bypass row level security configuration by injecting SQL into 'sqlExpression' fields. This allowed the execution of sub-queries to evade parsing defenses ultimately granting unauthorized access to data.
This issue affects Apache Superset: before 4.1.2.
Users are recommended to upgrade to version 4.1.2, which fixes the issue.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/ms2t2oq218hb7l628trsogo4fj7h1135 | Mailing List |
http://www.openwall.com/lists/oss-security/2025/05/30/3 | Mailing List |
Configurations
History
04 Jun 2025, 18:29
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-30 09:15
Updated : 2025-06-04 18:29
NVD link : CVE-2025-48912
Mitre link : CVE-2025-48912
CVE.ORG link : CVE-2025-48912
JSON object : View
Products Affected
apache
- superset
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')