CVE-2026-23969: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Apache Software Foundation Apache Superset
Apache Superset utilizes a configurable dictionary, DISALLOWED_SQL_FUNCTIONS, to restrict the execution of potentially sensitive SQL functions within SQL Lab and charts. While this feature included restrictions for engines like PostgreSQL, a vulnerability was reported where the default list for the ClickHouse engine was incomplete. This issue affects Apache Superset: before 4.1.2. Users are recommended to upgrade to version 4.1.2, which fixes the issue.
AI Analysis
Technical Summary
Apache Superset is an open-source data visualization and business intelligence platform that supports multiple SQL engines, including ClickHouse and PostgreSQL. To prevent execution of potentially dangerous SQL functions, Superset uses a configurable dictionary called DISALLOWED_SQL_FUNCTIONS, which restricts certain SQL functions within SQL Lab and chart queries. However, the default list for the ClickHouse engine was incomplete, failing to block some sensitive SQL functions. This gap allows an attacker with low privileges to craft SQL queries that execute restricted or harmful SQL commands, leading to SQL Injection (CWE-89). The vulnerability affects all versions before 4.1.2. Exploitation does not require user interaction or elevated privileges beyond low-level access, and it can compromise the confidentiality and integrity of the underlying database by unauthorized data access or manipulation. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to network attack vector, low complexity, no user interaction, and limited scope. The Apache Software Foundation has addressed this issue in version 4.1.2 by completing the DISALLOWED_SQL_FUNCTIONS list for ClickHouse, effectively preventing execution of dangerous SQL functions. No known exploits have been reported in the wild as of now.
Potential Impact
The vulnerability enables attackers with limited privileges to perform SQL Injection attacks on Apache Superset instances using the ClickHouse engine. This can lead to unauthorized data disclosure, data modification, or corruption, impacting the confidentiality and integrity of sensitive organizational data. Since Superset is widely used for business intelligence and data analytics, exploitation could compromise critical decision-making data and expose sensitive business information. The attack vector is network-based and does not require user interaction, increasing the risk of remote exploitation. However, the requirement for at least low-level privileges limits the scope somewhat. Organizations relying on Superset with ClickHouse may face data breaches, compliance violations, and operational disruptions if exploited. The lack of known exploits reduces immediate risk, but the vulnerability should be treated seriously given the potential impact on data security.
Mitigation Recommendations
Organizations should promptly upgrade Apache Superset to version 4.1.2 or later, where the DISALLOWED_SQL_FUNCTIONS list for ClickHouse is properly completed and enforced. In addition, administrators should review and customize the DISALLOWED_SQL_FUNCTIONS configuration to ensure all potentially dangerous SQL functions are blocked according to their environment and threat model. Implement strict access controls to limit user privileges within Superset, ensuring that only trusted users have the ability to run SQL queries. Monitor SQL Lab and chart query logs for unusual or unauthorized SQL function usage. Employ network segmentation and firewall rules to restrict access to Superset instances, reducing exposure to untrusted networks. Regularly audit and update Superset and its dependencies to incorporate security patches. Finally, consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) that can detect and block SQL Injection attempts targeting Superset.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, India, Netherlands, Brazil
CVE-2026-23969: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Apache Software Foundation Apache Superset
Description
Apache Superset utilizes a configurable dictionary, DISALLOWED_SQL_FUNCTIONS, to restrict the execution of potentially sensitive SQL functions within SQL Lab and charts. While this feature included restrictions for engines like PostgreSQL, a vulnerability was reported where the default list for the ClickHouse engine was incomplete. This issue affects Apache Superset: before 4.1.2. Users are recommended to upgrade to version 4.1.2, which fixes the issue.
AI-Powered Analysis
Technical Analysis
Apache Superset is an open-source data visualization and business intelligence platform that supports multiple SQL engines, including ClickHouse and PostgreSQL. To prevent execution of potentially dangerous SQL functions, Superset uses a configurable dictionary called DISALLOWED_SQL_FUNCTIONS, which restricts certain SQL functions within SQL Lab and chart queries. However, the default list for the ClickHouse engine was incomplete, failing to block some sensitive SQL functions. This gap allows an attacker with low privileges to craft SQL queries that execute restricted or harmful SQL commands, leading to SQL Injection (CWE-89). The vulnerability affects all versions before 4.1.2. Exploitation does not require user interaction or elevated privileges beyond low-level access, and it can compromise the confidentiality and integrity of the underlying database by unauthorized data access or manipulation. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to network attack vector, low complexity, no user interaction, and limited scope. The Apache Software Foundation has addressed this issue in version 4.1.2 by completing the DISALLOWED_SQL_FUNCTIONS list for ClickHouse, effectively preventing execution of dangerous SQL functions. No known exploits have been reported in the wild as of now.
Potential Impact
The vulnerability enables attackers with limited privileges to perform SQL Injection attacks on Apache Superset instances using the ClickHouse engine. This can lead to unauthorized data disclosure, data modification, or corruption, impacting the confidentiality and integrity of sensitive organizational data. Since Superset is widely used for business intelligence and data analytics, exploitation could compromise critical decision-making data and expose sensitive business information. The attack vector is network-based and does not require user interaction, increasing the risk of remote exploitation. However, the requirement for at least low-level privileges limits the scope somewhat. Organizations relying on Superset with ClickHouse may face data breaches, compliance violations, and operational disruptions if exploited. The lack of known exploits reduces immediate risk, but the vulnerability should be treated seriously given the potential impact on data security.
Mitigation Recommendations
Organizations should promptly upgrade Apache Superset to version 4.1.2 or later, where the DISALLOWED_SQL_FUNCTIONS list for ClickHouse is properly completed and enforced. In addition, administrators should review and customize the DISALLOWED_SQL_FUNCTIONS configuration to ensure all potentially dangerous SQL functions are blocked according to their environment and threat model. Implement strict access controls to limit user privileges within Superset, ensuring that only trusted users have the ability to run SQL queries. Monitor SQL Lab and chart query logs for unusual or unauthorized SQL function usage. Employ network segmentation and firewall rules to restrict access to Superset instances, reducing exposure to untrusted networks. Regularly audit and update Superset and its dependencies to incorporate security patches. Finally, consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) that can detect and block SQL Injection attempts targeting Superset.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2026-01-19T16:07:55.245Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699da85ebe58cf853bd63635
Added to database: 2/24/2026, 1:32:14 PM
Last enriched: 2/24/2026, 1:47:57 PM
Last updated: 2/24/2026, 10:19:58 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27593: CWE-640: Weak Password Recovery Mechanism for Forgotten Password in statamic cms
CriticalCVE-2026-27117: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in rikyoz bit7z
MediumCVE-2026-27572: CWE-770: Allocation of Resources Without Limits or Throttling in bytecodealliance wasmtime
MediumCVE-2026-27204: CWE-400: Uncontrolled Resource Consumption in bytecodealliance wasmtime
MediumCVE-2026-27195: CWE-755: Improper Handling of Exceptional Conditions in bytecodealliance wasmtime
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.