Skip to main content

CVE-2025-55673: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Apache Software Foundation Apache Superset

Medium
VulnerabilityCVE-2025-55673cvecve-2025-55673cwe-200
Published: Thu Aug 14 2025 (08/14/2025, 13:16:27 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Superset

Description

When a guest user accesses a chart in Apache Superset, the API response from the /chart/data endpoint includes a query field in its payload. This field contains the underlying query, which improperly discloses database schema information, such as table names, to the low-privileged guest user. This issue affects Apache Superset: before 4.1.3. Users are recommended to upgrade to version 4.1.3, which fixes the issue.

AI-Powered Analysis

AILast updated: 08/14/2025, 13:48:45 UTC

Technical Analysis

CVE-2025-55673 is a medium severity vulnerability in Apache Superset, an open-source data visualization and business intelligence platform maintained by the Apache Software Foundation. The vulnerability arises when a guest (unauthenticated or low-privileged) user accesses a chart via the /chart/data API endpoint. The API response includes a 'query' field that exposes the underlying database query used to generate the chart data. This query field inadvertently discloses sensitive database schema information such as table names to unauthorized users. This exposure violates the principle of least privilege and can aid attackers in reconnaissance activities by revealing internal database structure details. The vulnerability affects all versions of Apache Superset prior to 4.1.3, where the issue has been fixed. The CVSS v4.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and results in limited confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild. The root cause is improper filtering or redaction of sensitive query information in API responses accessible to guest users. This vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor).

Potential Impact

For European organizations using Apache Superset, this vulnerability can lead to unauthorized disclosure of internal database schema information to unauthenticated or low-privileged users. While it does not directly allow data modification or deletion, the exposure of table names and query structure can facilitate further targeted attacks such as SQL injection, privilege escalation, or data exfiltration by providing attackers with valuable intelligence about the backend database. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face increased compliance risks if sensitive schema details are leaked. Additionally, the exposure could undermine trust in data governance and security controls. Since Apache Superset is often deployed in data analytics environments, the vulnerability could indirectly impact confidentiality and operational security. The medium severity rating suggests a moderate risk, but the actual impact depends on the sensitivity of the underlying data and the deployment context within the organization.

Mitigation Recommendations

European organizations should immediately upgrade Apache Superset to version 4.1.3 or later, where this vulnerability is patched. Until the upgrade is applied, organizations should restrict guest or anonymous access to the Superset instance, especially to the /chart/data API endpoint, by enforcing authentication and role-based access controls. Network-level controls such as IP whitelisting or VPN access can limit exposure to trusted users only. Additionally, review and harden API response filtering to ensure no sensitive query or schema information is leaked to unauthorized users. Implement logging and monitoring to detect unusual access patterns to Superset APIs. Conduct a security audit of Superset configurations and database permissions to minimize the risk of further information disclosure. Finally, educate developers and administrators about secure API design and the importance of minimizing data exposure in responses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-08-13T12:56:08.660Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689de581ad5a09ad005b2add

Added to database: 8/14/2025, 1:32:49 PM

Last enriched: 8/14/2025, 1:48:45 PM

Last updated: 8/14/2025, 2:17:48 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats