Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23983: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Apache Software Foundation Apache Superset

0
Low
VulnerabilityCVE-2026-23983cvecve-2026-23983cwe-200
Published: Tue Feb 24 2026 (02/24/2026, 12:52:11 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Superset

Description

A Sensitive Data Exposure vulnerability exists in Apache Superset allowing authenticated users to retrieve sensitive user information. The Tag endpoint (disabled by default) allows users to retrieve a list of objects associated with a specific tag. When these associated objects include Users, the API response improperly serializes and returns sensitive fields, including password hashes (pbkdf2), email addresses, and login statistics. This vulnerability allows authenticated users with low privileges (e.g., Gamma role) to view sensitive authentication data This issue affects Apache Superset: before 6.0.0. Users are recommended to upgrade to version 6.0.0, which fixes the issue or make sure TAGGING_SYSTEM is False (Apache Superset current default)

AI-Powered Analysis

AILast updated: 02/24/2026, 13:47:13 UTC

Technical Analysis

Apache Superset, an open-source data visualization and business intelligence platform maintained by the Apache Software Foundation, is affected by CVE-2026-23983, a sensitive data exposure vulnerability classified under CWE-200. The flaw exists in versions before 6.0.0 and involves the Tag endpoint, which when enabled, allows authenticated users with low-level privileges (e.g., Gamma role) to retrieve a list of objects associated with specific tags. If these objects include user entities, the API response improperly serializes and exposes sensitive fields such as password hashes using the pbkdf2 algorithm, email addresses, and login statistics. This exposure occurs because the serialization process does not adequately filter sensitive attributes before returning data to the requester. The vulnerability requires the attacker to be authenticated but does not require elevated privileges beyond a low-level role, nor does it require user interaction. The Tag endpoint is disabled by default, reducing the attack surface unless explicitly enabled. Apache Superset 6.0.0 addresses this issue by correcting the serialization logic and ensuring sensitive fields are not exposed. Users are recommended to upgrade to this version or confirm that the TAGGING_SYSTEM feature remains disabled to mitigate risk. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) reflects a low-severity vulnerability with network attack vector, low complexity, and partial authentication required.

Potential Impact

The primary impact of CVE-2026-23983 is the unauthorized disclosure of sensitive user authentication data, including password hashes, email addresses, and login statistics, to low-privileged authenticated users. This exposure can facilitate further attacks such as offline password cracking attempts, targeted phishing campaigns, or user impersonation if attackers can leverage the leaked information. While the vulnerability does not allow direct privilege escalation or system compromise, the leakage of password hashes and user metadata undermines confidentiality and could lead to indirect compromise of user accounts or broader organizational systems. Organizations using Apache Superset in environments with multiple user roles, especially those with low-privileged users, face increased risk of insider threats or compromised accounts exploiting this vulnerability. The fact that the Tag endpoint is disabled by default limits exposure but does not eliminate risk if it is enabled for tagging functionality. Overall, the impact is moderate in terms of confidentiality but limited in integrity and availability. The vulnerability does not appear to be exploited in the wild at this time, but the presence of sensitive data exposure warrants prompt remediation to prevent potential abuse.

Mitigation Recommendations

To mitigate CVE-2026-23983, organizations should take the following specific actions: 1) Upgrade Apache Superset to version 6.0.0 or later, where the vulnerability is fixed by proper serialization of user data. 2) If upgrading is not immediately feasible, ensure that the TAGGING_SYSTEM feature remains disabled (which is the default setting) to prevent access to the vulnerable Tag endpoint. 3) Review and restrict user roles and permissions to minimize the number of users with access to the Gamma role or other low-privileged roles that can access the Tag endpoint. 4) Conduct audits of API usage logs to detect any unusual access patterns to the Tag endpoint or user data. 5) Implement monitoring and alerting for suspicious activities involving user data retrieval. 6) Educate administrators and developers about the risks of enabling features that expose sensitive data and enforce secure coding and configuration practices. 7) Consider additional hardening such as network segmentation and multi-factor authentication to reduce the risk of compromised low-privileged accounts exploiting this vulnerability. These targeted steps go beyond generic advice by focusing on the specific vulnerable feature and user roles involved.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2026-01-19T17:00:45.868Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699da85ebe58cf853bd6363e

Added to database: 2/24/2026, 1:32:14 PM

Last enriched: 2/24/2026, 1:47:13 PM

Last updated: 2/24/2026, 9:27:02 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats