{"id":"CVE-2025-55675","details":"Apache Superset contains an improper access control vulnerability in its /explore endpoint. A missing authorization check allows an authenticated user to discover metadata about datasources they do not have permission to access. By iterating through the datasource_id in the URL, an attacker can enumerate and confirm the existence and names of protected datasources, leading to sensitive information disclosure.\n\nThis issue affects Apache Superset: before 5.0.0.\n\nUsers are recommended to upgrade to version 5.0.0, which fixes the issue.","aliases":["BIT-superset-2025-55675","GHSA-mhpq-m962-mg92"],"modified":"2026-04-10T05:26:19.947090Z","published":"2025-08-14T14:15:34.953Z","references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/08/14/6"},{"type":"ADVISORY","url":"https://lists.apache.org/thread/op681b4kbd7g84tfjf9omz0sxggbcv33"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/superset","events":[{"introduced":"0"},{"fixed":"465e2a9631994892cf399d13dd926c56cecd58ca"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.0.0"}]}}],"versions":["0.10.0","0.11.0","0.12.0","0.13.1","0.13.2","0.14.1","0.15.0","0.15.1","0.15.3","0.15.4","0.15.4.1","0.16.0","0.16.1","0.17.0","0.17.1","0.17.2","0.17.3","0.17.4","0.17.5","0.17.6","0.18.2","0.18.3","0.18.4","0.18.5","0.19.1","0.2.1","0.20.1","0.25-fork","0.29.0rc1","0.4.0","0.5.0","0.5.1","0.5.2","0.5.3","0.6.0","0.6.1","0.7.0","0.8.0","0.8.3","0.8.4","0.8.5","0.8.6","0.8.7","0.8.8","0.8.9","0.9.0","0.9.1","2020.51.1","5.0.0rc1","5.0.0rc3","airbnb_prod.0.10.0.2","airbnb_prod.0.11.0.1","airbnb_prod.0.11.0.2","airbnb_prod.0.11.0.3","airbnb_prod.0.11.0.4","airbnb_prod.0.11.0.5","airbnb_prod.0.11.0.6","airbnb_prod.0.12.0.1","airbnb_prod.0.12.1.0","airbnb_prod.0.13.0.0","airbnb_prod.0.13.0.1","airbnb_prod.0.13.0.2","airbnb_prod.0.13.0.3","airbnb_prod.0.15.0.1","airbnb_prod.0.15.4.1","airbnb_prod.0.15.4.2","airbnb_prod.0.15.5.0","dummy","rm","superset-helm-chart-0.1.0","superset-helm-chart-0.1.1","superset-helm-chart-0.1.2","superset-helm-chart-0.1.3","superset-helm-chart-0.1.4","superset-helm-chart-0.1.5","superset-helm-chart-0.1.6","superset-helm-chart-0.10.0","superset-helm-chart-0.10.1","superset-helm-chart-0.10.10","superset-helm-chart-0.10.11","superset-helm-chart-0.10.12","superset-helm-chart-0.10.13","superset-helm-chart-0.10.14","superset-helm-chart-0.10.15","superset-helm-chart-0.10.2","superset-helm-chart-0.10.3","superset-helm-chart-0.10.4","superset-helm-chart-0.10.5","superset-helm-chart-0.10.6","superset-helm-chart-0.10.7","superset-helm-chart-0.10.8","superset-helm-chart-0.10.9","superset-helm-chart-0.11.0","superset-helm-chart-0.11.1","superset-helm-chart-0.11.2","superset-helm-chart-0.12.0","superset-helm-chart-0.12.1","superset-helm-chart-0.12.10","superset-helm-chart-0.12.11","superset-helm-chart-0.12.2","superset-helm-chart-0.12.3","superset-helm-chart-0.12.4","superset-helm-chart-0.12.5","superset-helm-chart-0.12.6","superset-helm-chart-0.12.7","superset-helm-chart-0.12.8","superset-helm-chart-0.12.9","superset-helm-chart-0.13.1","superset-helm-chart-0.13.2","superset-helm-chart-0.13.3","superset-helm-chart-0.13.5","superset-helm-chart-0.13.6","superset-helm-chart-0.14.0","superset-helm-chart-0.2.0","superset-helm-chart-0.2.1","superset-helm-chart-0.3.0","superset-helm-chart-0.3.1","superset-helm-chart-0.3.10","superset-helm-chart-0.3.11","superset-helm-chart-0.3.12","superset-helm-chart-0.3.2","superset-helm-chart-0.3.3","superset-helm-chart-0.3.4","superset-helm-chart-0.3.5","superset-helm-chart-0.3.6","superset-helm-chart-0.3.7","superset-helm-chart-0.3.8","superset-helm-chart-0.3.9","superset-helm-chart-0.4.0","superset-helm-chart-0.5.0","superset-helm-chart-0.5.1","superset-helm-chart-0.5.10","superset-helm-chart-0.5.2","superset-helm-chart-0.5.3","superset-helm-chart-0.5.4","superset-helm-chart-0.5.5","superset-helm-chart-0.5.6","superset-helm-chart-0.5.7","superset-helm-chart-0.5.8","superset-helm-chart-0.5.9","superset-helm-chart-0.6.0","superset-helm-chart-0.6.1","superset-helm-chart-0.6.2","superset-helm-chart-0.6.3","superset-helm-chart-0.6.4","superset-helm-chart-0.6.5","superset-helm-chart-0.6.6","superset-helm-chart-0.7.0","superset-helm-chart-0.7.1","superset-helm-chart-0.7.2","superset-helm-chart-0.7.3","superset-helm-chart-0.7.4","superset-helm-chart-0.7.6","superset-helm-chart-0.7.7","superset-helm-chart-0.8.0","superset-helm-chart-0.8.1","superset-helm-chart-0.8.10","superset-helm-chart-0.8.2","superset-helm-chart-0.8.3","superset-helm-chart-0.8.4","superset-helm-chart-0.8.5","superset-helm-chart-0.8.6","superset-helm-chart-0.8.7","superset-helm-chart-0.8.8","superset-helm-chart-0.8.9","superset-helm-chart-0.9.0","superset-helm-chart-0.9.1","superset-helm-chart-0.9.2","superset-helm-chart-0.9.3","superset-helm-chart-0.9.4","test_tag","v2020.51.0","v2021.10.0","v2021.13.0","v2021.15.0","v2021.17.0","v2021.18.0","v2021.19.0","v2021.20.0","v2021.21.0","v2021.22.0","v2021.23.0","v2021.23.1","v2021.24.0","v2021.25.0","v2021.27.0","v2021.27.1","v2021.29.0","v2021.3.0","v2021.31.0","v2021.34.0","v2021.35.0","v2021.36.0","v2021.36.5","v2021.38.0","v2021.40.0","v2021.41.0","v2021.5.0","v2021.5.1","v2021.6.0","v2021.7.0","v2021.8.0","v2021.9.0","v2021.9.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-55675.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}