Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55674: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Apache Software Foundation Apache Superset

0
Medium
VulnerabilityCVE-2025-55674cvecve-2025-55674cwe-89
Published: Thu Aug 14 2025 (08/14/2025, 13:18:10 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Superset

Description

A bypass of the DISALLOWED_SQL_FUNCTIONS security feature in Apache Superset allows for the execution of blocked SQL functions. An attacker can use a special inline block to circumvent the denylist. This allows a user with SQL Lab access to execute functions that were intended to be disabled, leading to the disclosure of sensitive database information like the software version. This issue affects Apache Superset: before 5.0.0. Users are recommended to upgrade to version 5.0.0, which fixes the issue.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:09:16 UTC

Technical Analysis

Apache Superset is an open-source data visualization and business intelligence platform widely used for interactive data exploration. CVE-2025-55674 is a vulnerability classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command, i.e., SQL Injection). The issue arises from a bypass of the DISALLOWED_SQL_FUNCTIONS security feature, which is designed to prevent execution of potentially dangerous SQL functions. An attacker with access to SQL Lab can craft a special inline block that circumvents this denylist, allowing execution of SQL functions that should be blocked. This bypass can lead to unauthorized disclosure of sensitive information stored in the database, such as the database software version, which can aid further attacks. The vulnerability affects all versions of Apache Superset before 5.0.0. The CVSS 4.0 base score is 5.3, reflecting medium severity, with attack vector as network, low attack complexity, no privileges required beyond SQL Lab access, and no user interaction needed. The scope and impact are limited to confidentiality leakage without affecting integrity or availability. No known public exploits have been reported yet. The recommended remediation is to upgrade to Apache Superset version 5.0.0, which contains the fix for this vulnerability.

Potential Impact

For European organizations using Apache Superset, this vulnerability poses a risk of unauthorized data disclosure, specifically sensitive database metadata that could facilitate further attacks. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, may face compliance risks if sensitive information is leaked. Since the vulnerability can be exploited remotely by any user with SQL Lab access, insider threats or compromised accounts could lead to data exposure. Although the vulnerability does not directly impact data integrity or availability, the information disclosure could be leveraged by attackers to escalate privileges or conduct targeted attacks. The medium severity suggests a moderate risk, but the widespread use of Apache Superset in data analytics environments across Europe increases the potential impact. Organizations relying on Superset for critical business intelligence should prioritize patching to prevent exploitation.

Mitigation Recommendations

1. Upgrade Apache Superset to version 5.0.0 or later immediately, as this version contains the official fix for CVE-2025-55674. 2. Restrict SQL Lab access strictly to trusted and trained users, minimizing the number of accounts with such privileges. 3. Implement network segmentation and access controls to limit exposure of Superset instances to only necessary users and systems. 4. Monitor SQL Lab usage logs for unusual or unauthorized query patterns that may indicate attempts to exploit this vulnerability. 5. Employ database activity monitoring solutions to detect anomalous SQL function executions. 6. Review and harden database user permissions to limit the impact of any unauthorized SQL function execution. 7. Educate users with SQL Lab access about safe query practices and the risks of executing untrusted SQL commands. 8. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious inline block patterns used in the bypass.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-08-13T13:02:25.259Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689de581ad5a09ad005b2ae0

Added to database: 8/14/2025, 1:32:49 PM

Last enriched: 11/4/2025, 10:09:16 PM

Last updated: 12/29/2025, 2:20:58 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats