A Sensitive Data Exposure vulnerability exists in Apache Superset allowing authenticated users to retrieve sensitive user information. The Tag endpoint (disabled by default) allows users to retrieve a list of objects associated with a specific tag.
When these associated objects include Users, the API response improperly serializes and returns sensitive fields, including password hashes (pbkdf2), email addresses, and login statistics. This vulnerability allows authenticated users with low privileges (e.g., Gamma role) to view sensitive authentication data
This issue affects Apache Superset: before 6.0.0.
Users are recommended to upgrade to version 6.0.0, which fixes the issue or make sure TAGGING_SYSTEM is False (Apache Superset current default)
References
| Link | Resource |
|---|---|
| https://lists.apache.org/thread/62mgbc5hc8026skp69kb6vqozj3pr5ww | Mailing List Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2026/02/24/7 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-02-24 14:16
Updated : 2026-02-25 14:37
NVD link : CVE-2026-23983
Mitre link : CVE-2026-23983
CVE.ORG link : CVE-2026-23983
JSON object : View
Products Affected
apache
- superset
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
