Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23969: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Apache Software Foundation Apache Superset

0
Medium
VulnerabilityCVE-2026-23969cvecve-2026-23969cwe-89
Published: Tue Feb 24 2026 (02/24/2026, 13:02:55 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Superset

Description

Apache Superset utilizes a configurable dictionary, DISALLOWED_SQL_FUNCTIONS, to restrict the execution of potentially sensitive SQL functions within SQL Lab and charts. While this feature included restrictions for engines like PostgreSQL, a vulnerability was reported where the default list for the ClickHouse engine was incomplete. This issue affects Apache Superset: before 4.1.2. Users are recommended to upgrade to version 4.1.2, which fixes the issue.

AI-Powered Analysis

AILast updated: 02/24/2026, 13:47:57 UTC

Technical Analysis

Apache Superset is an open-source data visualization and business intelligence platform that supports multiple SQL engines, including ClickHouse and PostgreSQL. To prevent execution of potentially dangerous SQL functions, Superset uses a configurable dictionary called DISALLOWED_SQL_FUNCTIONS, which restricts certain SQL functions within SQL Lab and chart queries. However, the default list for the ClickHouse engine was incomplete, failing to block some sensitive SQL functions. This gap allows an attacker with low privileges to craft SQL queries that execute restricted or harmful SQL commands, leading to SQL Injection (CWE-89). The vulnerability affects all versions before 4.1.2. Exploitation does not require user interaction or elevated privileges beyond low-level access, and it can compromise the confidentiality and integrity of the underlying database by unauthorized data access or manipulation. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to network attack vector, low complexity, no user interaction, and limited scope. The Apache Software Foundation has addressed this issue in version 4.1.2 by completing the DISALLOWED_SQL_FUNCTIONS list for ClickHouse, effectively preventing execution of dangerous SQL functions. No known exploits have been reported in the wild as of now.

Potential Impact

The vulnerability enables attackers with limited privileges to perform SQL Injection attacks on Apache Superset instances using the ClickHouse engine. This can lead to unauthorized data disclosure, data modification, or corruption, impacting the confidentiality and integrity of sensitive organizational data. Since Superset is widely used for business intelligence and data analytics, exploitation could compromise critical decision-making data and expose sensitive business information. The attack vector is network-based and does not require user interaction, increasing the risk of remote exploitation. However, the requirement for at least low-level privileges limits the scope somewhat. Organizations relying on Superset with ClickHouse may face data breaches, compliance violations, and operational disruptions if exploited. The lack of known exploits reduces immediate risk, but the vulnerability should be treated seriously given the potential impact on data security.

Mitigation Recommendations

Organizations should promptly upgrade Apache Superset to version 4.1.2 or later, where the DISALLOWED_SQL_FUNCTIONS list for ClickHouse is properly completed and enforced. In addition, administrators should review and customize the DISALLOWED_SQL_FUNCTIONS configuration to ensure all potentially dangerous SQL functions are blocked according to their environment and threat model. Implement strict access controls to limit user privileges within Superset, ensuring that only trusted users have the ability to run SQL queries. Monitor SQL Lab and chart query logs for unusual or unauthorized SQL function usage. Employ network segmentation and firewall rules to restrict access to Superset instances, reducing exposure to untrusted networks. Regularly audit and update Superset and its dependencies to incorporate security patches. Finally, consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) that can detect and block SQL Injection attempts targeting Superset.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2026-01-19T16:07:55.245Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699da85ebe58cf853bd63635

Added to database: 2/24/2026, 1:32:14 PM

Last enriched: 2/24/2026, 1:47:57 PM

Last updated: 2/24/2026, 10:19:58 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats