Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23984: CWE-863 Incorrect Authorization in Apache Software Foundation Apache Superset

0
High
VulnerabilityCVE-2026-23984cvecve-2026-23984cwe-863
Published: Tue Feb 24 2026 (02/24/2026, 12:51:07 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Superset

Description

An Improper Input Validation vulnerability exists in Apache Superset that allows an authenticated user with SQLLab access to bypass the read-only verification check when using a PostgreSQL database connection. While the system effectively blocks standard Data Manipulation Language (DML) statements (e.g., INSERT, UPDATE, DELETE) on read-only connections, it fails to detect them in specially crafted SQL statements. This issue affects Apache Superset: before 6.0.0. Users are recommended to upgrade to version 6.0.0, which fixes the issue.

AI-Powered Analysis

AILast updated: 02/24/2026, 13:46:31 UTC

Technical Analysis

CVE-2026-23984 is an authorization bypass vulnerability in Apache Superset, an open-source data visualization and business intelligence platform maintained by the Apache Software Foundation. The flaw specifically affects versions prior to 6.0.0 and targets the SQLLab feature, which allows users to run SQL queries against connected databases. When using PostgreSQL database connections configured as read-only, the system is designed to block Data Manipulation Language (DML) statements such as INSERT, UPDATE, and DELETE to prevent unauthorized data changes. However, due to improper input validation and incorrect authorization checks (classified under CWE-863: Incorrect Authorization), an authenticated user with SQLLab access can craft SQL queries that circumvent the read-only verification. This means that despite the read-only setting, malicious users can execute DML commands, potentially modifying or corrupting data. The vulnerability does not require user interaction beyond authentication and can be exploited remotely, increasing its risk. The CVSS 4.0 base score of 7.1 reflects its high severity, considering the network attack vector, low attack complexity, no privileges required beyond SQLLab access, and no user interaction needed. The scope is limited to PostgreSQL connections in Apache Superset, but given Superset's widespread use in data analytics environments, the impact can be significant. The issue was publicly disclosed on February 24, 2026, and fixed in Apache Superset version 6.0.0. No public exploits have been reported yet, but the vulnerability's nature makes it a critical concern for organizations relying on Superset for data visualization and analysis.

Potential Impact

The primary impact of CVE-2026-23984 is unauthorized data modification in PostgreSQL databases accessed through Apache Superset's SQLLab feature. Attackers with authenticated SQLLab access can bypass read-only restrictions and execute DML statements, leading to data integrity loss, corruption, or unauthorized data changes. This can compromise the reliability of business intelligence reports, analytics, and decision-making processes dependent on accurate data. Organizations may face operational disruptions, compliance violations, and reputational damage if sensitive or critical data is altered maliciously. Since Superset is often deployed in enterprise environments for data visualization and analytics, this vulnerability could affect financial, healthcare, governmental, and other sectors relying on PostgreSQL backends. The ease of exploitation without additional user interaction or elevated privileges increases the risk of insider threats or compromised user accounts being leveraged for malicious purposes. Although no known exploits are currently in the wild, the vulnerability's characteristics warrant urgent remediation to prevent potential attacks.

Mitigation Recommendations

1. Upgrade Apache Superset to version 6.0.0 or later, where this vulnerability is fixed. 2. Restrict SQLLab access strictly to trusted users and implement strong authentication and authorization controls to minimize the risk of compromised accounts. 3. Monitor database activity logs for unusual DML operations originating from Superset users, especially those with read-only connections. 4. Implement network segmentation and access controls to limit Superset's database connectivity to only necessary systems. 5. Consider additional database-level auditing and alerting on DML statements executed via Superset connections. 6. Review and tighten PostgreSQL user permissions associated with Superset connections to enforce least privilege principles. 7. Educate users about the risks of sharing credentials and enforce multi-factor authentication where possible. 8. Regularly review Superset configurations and update to the latest security patches promptly. These steps go beyond generic advice by focusing on access control, monitoring, and configuration hardening specific to this vulnerability's exploitation vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2026-01-19T17:13:41.800Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699da85ebe58cf853bd63641

Added to database: 2/24/2026, 1:32:14 PM

Last enriched: 2/24/2026, 1:46:31 PM

Last updated: 2/25/2026, 12:04:58 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats