🔐 CVE Alert

CVE-2026-23983

UNKNOWN 0.0

Apache Superset: Sensitive Data Exposure via REST API (disabled by default)

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A Sensitive Data Exposure vulnerability exists in Apache Superset allowing authenticated users to retrieve sensitive user information. The Tag endpoint (disabled by default) allows users to retrieve a list of objects associated with a specific tag. When these associated objects include Users, the API response improperly serializes and returns sensitive fields, including password hashes (pbkdf2), email addresses, and login statistics. This vulnerability allows authenticated users with low privileges (e.g., Gamma role) to view sensitive authentication data This issue affects Apache Superset: before 6.0.0. Users are recommended to upgrade to version 6.0.0, which fixes the issue or make sure TAGGING_SYSTEM is False (Apache Superset current default)

CWE CWE-200
Vendor apache software foundation
Product apache superset
Published Feb 24, 2026
Last Updated Feb 24, 2026
Stay Ahead of the Next One

Get instant alerts for apache software foundation apache superset

Be the first to know when new unknown vulnerabilities affecting apache software foundation apache superset are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Apache Software Foundation / Apache Superset
0.0.0 < 6.0.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
lists.apache.org: https://lists.apache.org/thread/62mgbc5hc8026skp69kb6vqozj3pr5ww openwall.com: http://www.openwall.com/lists/oss-security/2026/02/24/7

Credits

🔍 Krzysztof Maurek Daniel Gaspar