Apache Superset: SQLLab Improper readonly query validation allows unauthorized write access
Description
Improper Authorization vulnerability in Apache Superset. On Postgres analytic databases an attacker with SQLLab access can craft a specially designed SQL DML statement that is Incorrectly identified as a read-only query, enabling its execution. Non postgres analytics database connections and postgres analytics database connections set with a readonly user (advised) are not vulnerable.
This issue affects Apache Superset: before 4.1.0.
Users are recommended to upgrade to version 4.1.0, which fixes the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Superset before 4.1.0 has improper authorization in SQLLab that allows attackers to execute DML statements on Postgres databases, bypassing read-only checks.
Vulnerability
Details
CVE-2024-55633 is an improper authorization vulnerability in Apache Superset's SQLLab feature. The root cause is that on Postgres analytic databases, a specially crafted SQL DML statement is incorrectly identified as a read-only query, allowing its execution despite intended restrictions [1][2].
Exploitation
An attacker must have SQLLab access to exploit this vulnerability. By crafting a specific SQL DML statement, they can bypass the read-only query validation. Non-Postgres analytic database connections and Postgres connections configured with a readonly user are not affected [1][2].
Impact
Successful exploitation enables an attacker to execute write operations (DML statements) on Postgres databases, potentially leading to unauthorized data modification or deletion.
Mitigation
The issue is fixed in Apache Superset version 4.1.0. Users are strongly recommended to upgrade. Additionally, using a readonly database user for Postgres connections is advised as a preventive measure [1][2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
apache-supersetPyPI | < 4.1.0 | 4.1.0 |
Affected products
4- osv-coords2 versions
< 4.1.1+ 1 more
- (no CPE)range: < 4.1.1
- (no CPE)range: < 4.1.0
- Apache Software Foundation/Apache Supersetv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-787v-v9vq-4rgvghsaADVISORY
- lists.apache.org/thread/bwmd17fcvljt9q4cgctp4v09zh3qs7fbghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2024-55633ghsaADVISORY
- www.openwall.com/lists/oss-security/2024/12/12/1ghsaWEB
News mentions
0No linked articles in our index yet.