Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55672: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Apache Software Foundation Apache Superset

0
Medium
VulnerabilityCVE-2025-55672cvecve-2025-55672cwe-80
Published: Thu Aug 14 2025 (08/14/2025, 13:17:33 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Superset

Description

A stored Cross-Site Scripting (XSS) vulnerability exists in Apache Superset's chart visualization. An authenticated user with permissions to edit charts can inject a malicious payload into a column's label. The payload is not properly sanitized and gets executed in the victim's browser when they hover over the chart, potentially leading to session hijacking or the execution of arbitrary commands on behalf of the user. This issue affects Apache Superset: before 5.0.0. Users are recommended to upgrade to version 5.0.0, which fixes the issue.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:08:39 UTC

Technical Analysis

CVE-2025-55672 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-80, found in Apache Superset's chart visualization component prior to version 5.0.0. The flaw exists because the application fails to properly neutralize script-related HTML tags embedded in chart column labels. An authenticated user with permissions to edit charts can inject malicious JavaScript payloads into these labels. When other users view or hover over the affected charts, the payload executes in their browsers. This can lead to session hijacking, unauthorized actions performed on behalf of the victim, or other arbitrary command executions within the context of the victim's session. The vulnerability requires the attacker to have low privileges (chart editing rights) but does not require user interaction beyond viewing or hovering over the chart. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required beyond chart editing, no user interaction, and low impact on confidentiality, integrity, and availability, resulting in a medium severity score of 5.3. No known exploits have been reported in the wild, but the risk remains significant in multi-user environments. The issue is resolved in Apache Superset version 5.0.0, which implements proper sanitization of HTML content in chart labels.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Apache Superset for business intelligence and data visualization across multiple users. Exploitation could allow an insider or compromised user with chart editing rights to execute malicious scripts in the browsers of other users, potentially leading to session hijacking, unauthorized data access, or manipulation of displayed data. This could compromise the confidentiality and integrity of sensitive business data and analytics. In regulated industries such as finance, healthcare, or government sectors within Europe, such breaches could lead to compliance violations under GDPR and other data protection laws, resulting in legal and financial penalties. Additionally, the attack could be used as a foothold for further lateral movement within an organization’s network. The medium CVSS score reflects moderate risk but should not be underestimated given the potential for targeted attacks in environments with sensitive data.

Mitigation Recommendations

European organizations should immediately upgrade Apache Superset installations to version 5.0.0 or later, where this vulnerability is patched. Until the upgrade is applied, restrict chart editing permissions strictly to trusted users to minimize the risk of malicious payload injection. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing Superset dashboards. Conduct regular audits of chart configurations to detect suspicious or unexpected HTML content in labels. Educate users about the risks of interacting with untrusted charts and monitor logs for unusual activities related to chart editing or viewing. Additionally, consider isolating Superset instances within secure network segments and enforcing strong authentication and session management controls to reduce the impact of potential session hijacking. Finally, keep abreast of any emerging exploit reports or patches related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-08-13T12:38:31.381Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689de581ad5a09ad005b2ada

Added to database: 8/14/2025, 1:32:49 PM

Last enriched: 11/4/2025, 10:08:39 PM

Last updated: 11/12/2025, 8:48:20 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats