PyPI: apache-superset

CVE-2025-48912

Safety vulnerability ID: SFTY-20250530-52411

Safety legacy ID: pyup.io-77692

An authenticated malicious actor using specially crafted requests could bypass row-level security configuration by injecting SQL into 'sqlExpression' fields. This allowed the execution of sub-queries to evade parsing defences, ultimately granting unauthorized access to data. This issue affects Apache Superset: before 4.1.2. Users are recommended to upgrade to version 4.1.2, which fixes the issue.

Created at: Mar 4, 2026Updated at: Mar 4, 2026

Overview

Apache Superset: Improper authorization bypass on row level security via SQL Injection

Advisory

An authenticated malicious actor using specially crafted requests could bypass row-level security configuration by injecting SQL into 'sqlExpression' fields. This allowed the execution of sub-queries to evade parsing defences, ultimately granting unauthorized access to data. This issue affects Apache Superset: before 4.1.2. Users are recommended to upgrade to version 4.1.2, which fixes the issue.

Affected Package

Affecting apache-superset package, versions
<4.1.2rc1

Also affects

---

How to Fix

Upgrade
apache-superset
to
4.1.2rc1
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more