PyPI: apache-superset

CVE-2025-55675

Safety vulnerability ID: SFTY-20250815-44240

Safety legacy ID: pyup.io-78710

Affected versions of the Apache Superset package are vulnerable to Improper Authorization due to insufficient access control in endpoints that allow ownership transfer. The API endpoints for dashboards, charts, and datasets fail to enforce proper authorization checks on ownership-related attributes, enabling authenticated read‑permission users to manipulate ownership. An attacker who is authenticated with only read permissions can exploit this by crafting requests to these endpoints to take over ownership of dashboards, charts or datasets, compromising data integrity, confidentiality, and availability.

Created at: Nov 5, 2025Updated at: Nov 5, 2025

Overview

Apache Superset allows authenticated users to discover metadata about datasources they don't have permission to access

Advisory

Affected versions of the Apache Superset package are vulnerable to Improper Authorization due to insufficient access control in endpoints that allow ownership transfer. The API endpoints for dashboards, charts, and datasets fail to enforce proper authorization checks on ownership-related attributes, enabling authenticated read‑permission users to manipulate ownership. An attacker who is authenticated with only read permissions can exploit this by crafting requests to these endpoints to take over ownership of dashboards, charts or datasets, compromising data integrity, confidentiality, and availability.

Affected Package

Affecting apache-superset package, versions
<5.0.0

Also affects

---

How to Fix

Upgrade
apache-superset
to
5.0.0
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more