Apache Superset: Improper authorization bypass on row level security via SQL Injection
Description
An authenticated malicious actor using specially crafted requests could bypass row level security configuration by injecting SQL into 'sqlExpression' fields. This allowed the execution of sub-queries to evade parsing defenses ultimately granting unauthorized access to data.
This issue affects Apache Superset: before 4.1.2.
Users are recommended to upgrade to version 4.1.2, which fixes the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An authenticated attacker can bypass row-level security in Apache Superset by injecting SQL into 'sqlExpression' fields, gaining unauthorized data access.
Vulnerability
Description
CVE-2025-48912 is an improper authorization bypass vulnerability in Apache Superset before version 4.1.2. An authenticated attacker can craft requests that inject malicious SQL into 'sqlExpression' fields, which are used for row-level security (RLS) filtering. The vulnerability arises because the parser does not adequately sanitize or parse sub-queries within these expressions, allowing the injection to bypass intended RLS restrictions.
Attack
Vector
Exploitation requires an authenticated user account within Apache Superset. The attacker does not need administrative privileges; any authenticated user can submit specially crafted requests containing injected sub-queries in 'sqlExpression' fields. This can be done through the application's interface or API. The attacker manipulates the SQL expression to include sub-queries that evade the existing parsing defenses, effectively circumventing the row-level security configuration.
Impact
Successful exploitation allows the authenticated attacker to execute arbitrary sub-queries, leading to unauthorized access to data that should be restricted by row-level security policies. This could mean reading, modifying, or exfiltrating data from tables or rows the attacker is not permitted to access. The impact is a breach of data confidentiality and potentially integrity, depending on the database permissions.
Mitigation
The Apache Superset project has released version 4.1.2, which fixes this issue by improving the parsing defenses in 'sqlExpression' fields to block sub-query injection attempts. Users are strongly recommended to upgrade to this version as soon as possible. No workarounds are mentioned in the advisories [1][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
apache-supersetPyPI | < 4.1.2 | 4.1.2 |
Affected products
4- osv-coords2 versions
< 4.1.2+ 1 more
- (no CPE)range: < 4.1.2
- (no CPE)range: < 4.1.2
- Apache Software Foundation/Apache Supersetv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-8w7f-8pr9-xgwjghsaADVISORY
- lists.apache.org/thread/ms2t2oq218hb7l628trsogo4fj7h1135ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2025-48912ghsaADVISORY
- www.openwall.com/lists/oss-security/2025/05/30/3ghsaWEB
News mentions
0No linked articles in our index yet.