Home

Description

A Sensitive Data Exposure vulnerability exists in Apache Superset allowing authenticated users to retrieve sensitive user information. The Tag endpoint (disabled by default) allows users to retrieve a list of objects associated with a specific tag. When these associated objects include Users, the API response improperly serializes and returns sensitive fields, including password hashes (pbkdf2), email addresses, and login statistics. This vulnerability allows authenticated users with low privileges (e.g., Gamma role) to view sensitive authentication data This issue affects Apache Superset: before 6.0.0. Users are recommended to upgrade to version 6.0.0, which fixes the issue or make sure TAGGING_SYSTEM is False (Apache Superset current default)

PUBLISHED Reserved 2026-01-19 | Published 2026-02-24 | Updated 2026-02-24 | Assigner apache




LOW: 2.3CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

0.0.0 (semver) before 6.0.0
affected

Credits

Krzysztof Maurek reporter

Daniel Gaspar remediation developer

References

www.openwall.com/lists/oss-security/2026/02/24/7

lists.apache.org/thread/62mgbc5hc8026skp69kb6vqozj3pr5ww vendor-advisory

cve.org (CVE-2026-23983)

nvd.nist.gov (CVE-2026-23983)

Download JSON