PyPI: apache-superset
CVE-2025-48912
Safety vulnerability ID: SFTY-20250530-52411
Safety legacy ID: pyup.io-77692
An authenticated malicious actor using specially crafted requests could bypass row-level security configuration by injecting SQL into 'sqlExpression' fields. This allowed the execution of sub-queries to evade parsing defences, ultimately granting unauthorized access to data. This issue affects Apache Superset: before 4.1.2. Users are recommended to upgrade to version 4.1.2, which fixes the issue.
Overview
Apache Superset: Improper authorization bypass on row level security via SQL Injection
Advisory
An authenticated malicious actor using specially crafted requests could bypass row-level security configuration by injecting SQL into 'sqlExpression' fields. This allowed the execution of sub-queries to evade parsing defences, ultimately granting unauthorized access to data. This issue affects Apache Superset: before 4.1.2. Users are recommended to upgrade to version 4.1.2, which fixes the issue.
How to Fix
Mitigation and Workarounds
---
Vulnerable Functions
Functions linked to known vulnerabilities.
References
- https://getsafety.com/vulnerabilities/SFTY-20250530-52411/CVE-2025-48912
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48912
- https://github.com/advisories/GHSA-8w7f-8pr9-xgwj
- https://nvd.nist.gov/vuln/detail/CVE-2025-48912
- https://lists.apache.org/thread/ms2t2oq218hb7l628trsogo4fj7h1135
- http://www.openwall.com/lists/oss-security/2025/05/30/3
- https://github.com/advisories/GHSA-8w7f-8pr9-xgwj
Verified by Safety
Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.
Learn more
