CVE-2025-55672: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Apache Software Foundation Apache Superset
A stored Cross-Site Scripting (XSS) vulnerability exists in Apache Superset's chart visualization. An authenticated user with permissions to edit charts can inject a malicious payload into a column's label. The payload is not properly sanitized and gets executed in the victim's browser when they hover over the chart, potentially leading to session hijacking or the execution of arbitrary commands on behalf of the user. This issue affects Apache Superset: before 5.0.0. Users are recommended to upgrade to version 5.0.0, which fixes the issue.
AI Analysis
Technical Summary
CVE-2025-55672 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-80, found in Apache Superset's chart visualization component prior to version 5.0.0. The flaw exists because the application fails to properly neutralize script-related HTML tags embedded in chart column labels. An authenticated user with permissions to edit charts can inject malicious JavaScript payloads into these labels. When other users view or hover over the affected charts, the payload executes in their browsers. This can lead to session hijacking, unauthorized actions performed on behalf of the victim, or other arbitrary command executions within the context of the victim's session. The vulnerability requires the attacker to have low privileges (chart editing rights) but does not require user interaction beyond viewing or hovering over the chart. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required beyond chart editing, no user interaction, and low impact on confidentiality, integrity, and availability, resulting in a medium severity score of 5.3. No known exploits have been reported in the wild, but the risk remains significant in multi-user environments. The issue is resolved in Apache Superset version 5.0.0, which implements proper sanitization of HTML content in chart labels.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Apache Superset for business intelligence and data visualization across multiple users. Exploitation could allow an insider or compromised user with chart editing rights to execute malicious scripts in the browsers of other users, potentially leading to session hijacking, unauthorized data access, or manipulation of displayed data. This could compromise the confidentiality and integrity of sensitive business data and analytics. In regulated industries such as finance, healthcare, or government sectors within Europe, such breaches could lead to compliance violations under GDPR and other data protection laws, resulting in legal and financial penalties. Additionally, the attack could be used as a foothold for further lateral movement within an organization’s network. The medium CVSS score reflects moderate risk but should not be underestimated given the potential for targeted attacks in environments with sensitive data.
Mitigation Recommendations
European organizations should immediately upgrade Apache Superset installations to version 5.0.0 or later, where this vulnerability is patched. Until the upgrade is applied, restrict chart editing permissions strictly to trusted users to minimize the risk of malicious payload injection. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing Superset dashboards. Conduct regular audits of chart configurations to detect suspicious or unexpected HTML content in labels. Educate users about the risks of interacting with untrusted charts and monitor logs for unusual activities related to chart editing or viewing. Additionally, consider isolating Superset instances within secure network segments and enforcing strong authentication and session management controls to reduce the impact of potential session hijacking. Finally, keep abreast of any emerging exploit reports or patches related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-55672: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Apache Software Foundation Apache Superset
Description
A stored Cross-Site Scripting (XSS) vulnerability exists in Apache Superset's chart visualization. An authenticated user with permissions to edit charts can inject a malicious payload into a column's label. The payload is not properly sanitized and gets executed in the victim's browser when they hover over the chart, potentially leading to session hijacking or the execution of arbitrary commands on behalf of the user. This issue affects Apache Superset: before 5.0.0. Users are recommended to upgrade to version 5.0.0, which fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-55672 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-80, found in Apache Superset's chart visualization component prior to version 5.0.0. The flaw exists because the application fails to properly neutralize script-related HTML tags embedded in chart column labels. An authenticated user with permissions to edit charts can inject malicious JavaScript payloads into these labels. When other users view or hover over the affected charts, the payload executes in their browsers. This can lead to session hijacking, unauthorized actions performed on behalf of the victim, or other arbitrary command executions within the context of the victim's session. The vulnerability requires the attacker to have low privileges (chart editing rights) but does not require user interaction beyond viewing or hovering over the chart. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required beyond chart editing, no user interaction, and low impact on confidentiality, integrity, and availability, resulting in a medium severity score of 5.3. No known exploits have been reported in the wild, but the risk remains significant in multi-user environments. The issue is resolved in Apache Superset version 5.0.0, which implements proper sanitization of HTML content in chart labels.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Apache Superset for business intelligence and data visualization across multiple users. Exploitation could allow an insider or compromised user with chart editing rights to execute malicious scripts in the browsers of other users, potentially leading to session hijacking, unauthorized data access, or manipulation of displayed data. This could compromise the confidentiality and integrity of sensitive business data and analytics. In regulated industries such as finance, healthcare, or government sectors within Europe, such breaches could lead to compliance violations under GDPR and other data protection laws, resulting in legal and financial penalties. Additionally, the attack could be used as a foothold for further lateral movement within an organization’s network. The medium CVSS score reflects moderate risk but should not be underestimated given the potential for targeted attacks in environments with sensitive data.
Mitigation Recommendations
European organizations should immediately upgrade Apache Superset installations to version 5.0.0 or later, where this vulnerability is patched. Until the upgrade is applied, restrict chart editing permissions strictly to trusted users to minimize the risk of malicious payload injection. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing Superset dashboards. Conduct regular audits of chart configurations to detect suspicious or unexpected HTML content in labels. Educate users about the risks of interacting with untrusted charts and monitor logs for unusual activities related to chart editing or viewing. Additionally, consider isolating Superset instances within secure network segments and enforcing strong authentication and session management controls to reduce the impact of potential session hijacking. Finally, keep abreast of any emerging exploit reports or patches related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-08-13T12:38:31.381Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689de581ad5a09ad005b2ada
Added to database: 8/14/2025, 1:32:49 PM
Last enriched: 11/4/2025, 10:08:39 PM
Last updated: 11/12/2025, 8:48:20 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64186: CWE-347: Improper Verification of Cryptographic Signature in evervault evervault-go
HighCVE-2025-64170: CWE-549: Missing Password Field Masking in trifectatechfoundation sudo-rs
LowCVE-2025-13061: Unrestricted Upload in itsourcecode Online Voting System
MediumCVE-2025-46608: CWE-284: Improper Access Control in Dell Data Lakehouse
CriticalCVE-2025-46427: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Dell SmartFabric OS10 Software
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.