Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23984: CWE-863 Incorrect Authorization in Apache Software Foundation Apache Superset

0
High
VulnerabilityCVE-2026-23984cvecve-2026-23984cwe-863
Published: Tue Feb 24 2026 (02/24/2026, 12:51:07 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Superset

Description

An Improper Input Validation vulnerability exists in Apache Superset that allows an authenticated user with SQLLab access to bypass the read-only verification check when using a PostgreSQL database connection. While the system effectively blocks standard Data Manipulation Language (DML) statements (e.g., INSERT, UPDATE, DELETE) on read-only connections, it fails to detect them in specially crafted SQL statements. This issue affects Apache Superset: before 6.0.0. Users are recommended to upgrade to version 6.0.0, which fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 01:59:12 UTC

Technical Analysis

CVE-2026-23984 is an authorization bypass vulnerability categorized under CWE-863 (Incorrect Authorization) affecting Apache Superset, an open-source data visualization and exploration platform. The flaw exists in versions before 6.0.0 and specifically impacts PostgreSQL database connections configured as read-only within the SQLLab interface. Normally, Superset enforces read-only restrictions by blocking Data Manipulation Language (DML) statements such as INSERT, UPDATE, and DELETE to prevent unauthorized data changes. However, due to improper input validation, specially crafted SQL statements can circumvent these checks, allowing an authenticated user with SQLLab access to execute unauthorized DML commands. This bypass undermines the integrity of the database by permitting data modifications where only read operations should be allowed. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v4.0 base score is 7.1, reflecting high severity due to network attack vector, low attack complexity, no privileges required beyond SQLLab access, and significant impact on data integrity. The issue was publicly disclosed on February 24, 2026, with no known exploits in the wild at the time. The recommended remediation is upgrading to Apache Superset version 6.0.0, which includes fixes to properly validate and block unauthorized DML statements in read-only contexts.

Potential Impact

The primary impact of CVE-2026-23984 is unauthorized modification of data in PostgreSQL databases accessed via Apache Superset’s SQLLab interface. This can lead to data integrity breaches, potentially corrupting critical business data, analytics results, and decision-making processes. Organizations relying on Superset for business intelligence, reporting, or data exploration may face inaccurate insights or compromised datasets. Since the vulnerability requires authenticated access with SQLLab privileges, insider threats or compromised user accounts pose significant risks. The ability to bypass read-only restrictions increases the attack surface, enabling malicious actors to perform unauthorized inserts, updates, or deletions. This could disrupt operations, cause compliance violations, or damage organizational reputation. Although availability and confidentiality impacts are limited, the integrity impact is high. The vulnerability affects all organizations using vulnerable Superset versions with PostgreSQL backends, especially those with multiple users granted SQLLab access. Without timely patching, attackers could exploit this flaw to manipulate data undetected.

Mitigation Recommendations

1. Upgrade Apache Superset to version 6.0.0 or later immediately, as this version contains the fix for the authorization bypass issue. 2. Review and restrict SQLLab access permissions to only trusted users, minimizing the number of users who can exploit this vulnerability. 3. Implement strong authentication and monitoring for Superset users, including multi-factor authentication and logging of SQLLab activities to detect suspicious DML attempts. 4. Conduct regular audits of database changes originating from Superset to identify unauthorized modifications promptly. 5. If upgrading is temporarily not possible, consider disabling SQLLab or restricting PostgreSQL connections to trusted users only, or enforce database-level read-only roles as an additional control. 6. Educate users about the risks of executing arbitrary SQL commands and enforce least privilege principles. 7. Monitor Apache Superset and PostgreSQL logs for anomalous SQL statements that could indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2026-01-19T17:13:41.800Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699da85ebe58cf853bd63641

Added to database: 2/24/2026, 1:32:14 PM

Last enriched: 3/4/2026, 1:59:12 AM

Last updated: 4/10/2026, 6:25:14 PM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses