๐Ÿ” CVE Alert

CVE-2023-27524

HIGH 8.9 โš ๏ธ CISA KEV

Apache Superset: Session validation vulnerability when using provided default SECRET_KEY

CVSS Score
8.9
EPSS Score
0.0%
EPSS Percentile
0th

Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database. Add a strong SECRET_KEY to your `superset_config.py` file like: SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY> Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.

CWE CWE-1188
Vendor apache software foundation
Product apache superset
Published Apr 24, 2023
Last Updated Oct 21, 2025
โš ๏ธ Actively Exploited โ€” Act Now

Get instant alerts for apache software foundation apache superset

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2023-27524.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
Low

Affected Versions

Apache Software Foundation / Apache Superset
0 โ‰ค 2.0.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
lists.apache.org: https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk openwall.com: https://www.openwall.com/lists/oss-security/2023/04/24/2 packetstormsecurity.com: https://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html packetstormsecurity.com: https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-27524

Credits

Naveen Sunkavally (Horizon3.ai)