Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23969: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Apache Software Foundation Apache Superset

0
Medium
VulnerabilityCVE-2026-23969cvecve-2026-23969cwe-89
Published: Tue Feb 24 2026 (02/24/2026, 13:02:55 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Superset

Description

Apache Superset utilizes a configurable dictionary, DISALLOWED_SQL_FUNCTIONS, to restrict the execution of potentially sensitive SQL functions within SQL Lab and charts. While this feature included restrictions for engines like PostgreSQL, a vulnerability was reported where the default list for the ClickHouse engine was incomplete. This issue affects Apache Superset: before 4.1.2. Users are recommended to upgrade to version 4.1.2, which fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 01:58:20 UTC

Technical Analysis

Apache Superset, an open-source data visualization and exploration platform, includes a security feature called DISALLOWED_SQL_FUNCTIONS to prevent execution of potentially dangerous SQL functions within its SQL Lab and charting components. This feature works by maintaining a configurable dictionary that lists SQL functions disallowed for execution, tailored per SQL engine. However, in versions prior to 4.1.2, the default disallowed functions list for the ClickHouse engine was incomplete. This gap allows attackers to craft malicious SQL queries that invoke sensitive or dangerous SQL functions not properly blocked by Superset's controls. The vulnerability is classified as CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), commonly known as SQL Injection. Exploitation requires no user interaction and no authentication, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N). The attacker needs limited privileges but can execute arbitrary SQL commands, potentially leading to unauthorized data access or manipulation. The vulnerability affects all Apache Superset versions before 4.1.2, regardless of the underlying operating system, as it is application-level. The Apache Software Foundation has addressed this issue in version 4.1.2 by completing the DISALLOWED_SQL_FUNCTIONS list for ClickHouse, thereby preventing execution of unauthorized SQL functions. No public exploits or active attacks have been reported yet, but the medium CVSS score (5.3) reflects a moderate risk due to ease of exploitation and potential impact on data confidentiality and integrity.

Potential Impact

The primary impact of CVE-2026-23969 is the potential for unauthorized SQL command execution within Apache Superset environments using the ClickHouse engine. This can lead to unauthorized data access, data modification, or data deletion, compromising confidentiality, integrity, and possibly availability of critical business data. Organizations relying on Apache Superset for business intelligence and analytics could face data breaches or manipulation, undermining decision-making processes and regulatory compliance. Since exploitation does not require user interaction and only limited privileges, insider threats or compromised accounts with minimal rights could escalate their access. The vulnerability could also be leveraged as a foothold for further attacks within the network. Although no exploits are currently known in the wild, the widespread use of Apache Superset in enterprises and public sector organizations globally elevates the risk. Failure to patch could result in significant operational disruption, reputational damage, and financial loss, especially in data-sensitive industries such as finance, healthcare, and government.

Mitigation Recommendations

1. Upgrade Apache Superset to version 4.1.2 or later immediately, as this version contains the fix that completes the DISALLOWED_SQL_FUNCTIONS list for ClickHouse. 2. Review and customize the DISALLOWED_SQL_FUNCTIONS dictionary for all SQL engines in use, ensuring that sensitive functions are explicitly blocked according to organizational security policies. 3. Implement strict access controls and least privilege principles for users accessing SQL Lab and charting features, minimizing the risk of privilege abuse. 4. Monitor SQL query logs for unusual or unauthorized function calls, especially those involving ClickHouse, to detect potential exploitation attempts early. 5. Employ network segmentation and application-layer firewalls to restrict access to Apache Superset instances, reducing exposure to untrusted networks. 6. Conduct regular security assessments and penetration tests focusing on SQL injection vectors within Superset environments. 7. Educate developers and analysts on secure query practices and the risks of SQL injection in data visualization tools. 8. If upgrading immediately is not feasible, consider disabling or restricting SQL Lab and charting features for ClickHouse until patched.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2026-01-19T16:07:55.245Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699da85ebe58cf853bd63635

Added to database: 2/24/2026, 1:32:14 PM

Last enriched: 3/4/2026, 1:58:20 AM

Last updated: 4/10/2026, 2:06:28 PM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses