Vulnerability Description
A Sensitive Data Exposure vulnerability exists in Apache Superset allowing authenticated users to retrieve sensitive user information. The Tag endpoint (disabled by default) allows users to retrieve a list of objects associated with a specific tag. When these associated objects include Users, the API response improperly serializes and returns sensitive fields, including password hashes (pbkdf2), email addresses, and login statistics. This vulnerability allows authenticated users with low privileges (e.g., Gamma role) to view sensitive authentication data This issue affects Apache Superset: before 6.0.0. Users are recommended to upgrade to version 6.0.0, which fixes the issue or make sure TAGGING_SYSTEM is False (Apache Superset current default)
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Superset | < 6.0.0 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread/62mgbc5hc8026skp69kb6vqozj3pr5wwMailing ListVendor Advisory
- http://www.openwall.com/lists/oss-security/2026/02/24/7Mailing ListThird Party Advisory
FAQ
What is CVE-2026-23983?
CVE-2026-23983 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A Sensitive Data Exposure vulnerability exists in Apache Superset allowing authenticated users to retrieve sensitive user information. The Tag endpoint (disabled by default) allows users to retrieve a...
How severe is CVE-2026-23983?
CVE-2026-23983 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23983?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Superset.