VYPR
High severityNVD Advisory· Published May 30, 2025· Updated May 31, 2025

Apache Superset: Improper authorization bypass on row level security via SQL Injection

CVE-2025-48912

Description

An authenticated malicious actor using specially crafted requests could bypass row level security configuration by injecting SQL into 'sqlExpression' fields. This allowed the execution of sub-queries to evade parsing defenses ultimately granting unauthorized access to data.

This issue affects Apache Superset: before 4.1.2.

Users are recommended to upgrade to version 4.1.2, which fixes the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An authenticated attacker can bypass row-level security in Apache Superset by injecting SQL into 'sqlExpression' fields, gaining unauthorized data access.

Vulnerability

Description

CVE-2025-48912 is an improper authorization bypass vulnerability in Apache Superset before version 4.1.2. An authenticated attacker can craft requests that inject malicious SQL into 'sqlExpression' fields, which are used for row-level security (RLS) filtering. The vulnerability arises because the parser does not adequately sanitize or parse sub-queries within these expressions, allowing the injection to bypass intended RLS restrictions.

Attack

Vector

Exploitation requires an authenticated user account within Apache Superset. The attacker does not need administrative privileges; any authenticated user can submit specially crafted requests containing injected sub-queries in 'sqlExpression' fields. This can be done through the application's interface or API. The attacker manipulates the SQL expression to include sub-queries that evade the existing parsing defenses, effectively circumventing the row-level security configuration.

Impact

Successful exploitation allows the authenticated attacker to execute arbitrary sub-queries, leading to unauthorized access to data that should be restricted by row-level security policies. This could mean reading, modifying, or exfiltrating data from tables or rows the attacker is not permitted to access. The impact is a breach of data confidentiality and potentially integrity, depending on the database permissions.

Mitigation

The Apache Superset project has released version 4.1.2, which fixes this issue by improving the parsing defenses in 'sqlExpression' fields to block sub-query injection attempts. Users are strongly recommended to upgrade to this version as soon as possible. No workarounds are mentioned in the advisories [1][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
apache-supersetPyPI
< 4.1.24.1.2

Affected products

4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.