We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An authenticated malicious actor using specially crafted requests could bypass row level security configuration by injecting SQL into 'sqlExpression' fields. This allowed the execution of sub-queries to evade parsing defenses ultimately granting unauthorized access to data. This issue affects Apache Superset: before 4.1.2. Users are recommended to upgrade to version 4.1.2, which fixes the issue.
Reserved 2025-05-28 | Published 2025-05-30 | Updated 2025-05-31 | Assigner apacheCWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Pedro Sousa
Beto de Almeida
Mirakl Security
lists.apache.org/thread/ms2t2oq218hb7l628trsogo4fj7h1135
Support options