{"id":"CVE-2026-23982","details":"An Improper Authorization vulnerability exists in Apache Superset that allows a low-privileged user to bypass data access controls. When creating a dataset, Superset enforces permission checks to prevent users from querying unauthorized data. However, an authenticated attacker with permissions to write datasets and read charts can bypass these checks by overwriting the SQL query of an existing dataset.\n\nThis issue affects Apache Superset: before 6.0.0.\n\nUsers are recommended to upgrade to version 6.0.0, which fixes the issue.","aliases":["BIT-superset-2026-23982","GHSA-3m2g-v7jf-7fxc"],"modified":"2026-03-14T12:48:00.493116Z","published":"2026-02-24T14:16:22.980Z","references":[{"type":"ADVISORY","url":"https://lists.apache.org/thread/9lvbzwkw4rxgdvbpfvnnnfcll92v75fp"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2026/02/24/6"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/superset","events":[{"introduced":"0"},{"fixed":"6a1c30e5e7c3e28d0549c9c2ac0ff61607f26a2f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.0.0"}]}}],"versions":["0.10.0","0.11.0","0.12.0","0.13.1","0.13.2","0.14.1","0.15.0","0.15.1","0.15.3","0.15.4","0.15.4.1","0.16.0","0.16.1","0.17.0","0.17.1","0.17.2","0.17.3","0.17.4","0.17.5","0.17.6","0.18.2","0.18.3","0.18.4","0.18.5","0.19.1","0.2.1","0.20.1","0.25-fork","0.29.0rc1","0.4.0","0.5.0","0.5.1","0.5.2","0.5.3","0.6.0","0.6.1","0.7.0","0.8.0","0.8.3","0.8.4","0.8.5","0.8.6","0.8.7","0.8.8","0.8.9","0.9.0","0.9.1","2020.51.1","6.0.0rc1","6.0.0rc2","6.0.0rc3","airbnb_prod.0.10.0.2","airbnb_prod.0.11.0.1","airbnb_prod.0.11.0.2","airbnb_prod.0.11.0.3","airbnb_prod.0.11.0.4","airbnb_prod.0.11.0.5","airbnb_prod.0.11.0.6","airbnb_prod.0.12.0.1","airbnb_prod.0.12.1.0","airbnb_prod.0.13.0.0","airbnb_prod.0.13.0.1","airbnb_prod.0.13.0.2","airbnb_prod.0.13.0.3","airbnb_prod.0.15.0.1","airbnb_prod.0.15.4.1","airbnb_prod.0.15.4.2","airbnb_prod.0.15.5.0","dummy","rm","superset-helm-chart-0.1.0","superset-helm-chart-0.1.1","superset-helm-chart-0.1.2","superset-helm-chart-0.1.3","superset-helm-chart-0.1.4","superset-helm-chart-0.1.5","superset-helm-chart-0.1.6","superset-helm-chart-0.10.0","superset-helm-chart-0.10.1","superset-helm-chart-0.10.10","superset-helm-chart-0.10.11","superset-helm-chart-0.10.12","superset-helm-chart-0.10.13","superset-helm-chart-0.10.14","superset-helm-chart-0.10.15","superset-helm-chart-0.10.2","superset-helm-chart-0.10.3","superset-helm-chart-0.10.4","superset-helm-chart-0.10.5","superset-helm-chart-0.10.6","superset-helm-chart-0.10.7","superset-helm-chart-0.10.8","superset-helm-chart-0.10.9","superset-helm-chart-0.11.0","superset-helm-chart-0.11.1","superset-helm-chart-0.11.2","superset-helm-chart-0.12.0","superset-helm-chart-0.12.1","superset-helm-chart-0.12.10","superset-helm-chart-0.12.11","superset-helm-chart-0.12.2","superset-helm-chart-0.12.3","superset-helm-chart-0.12.4","superset-helm-chart-0.12.5","superset-helm-chart-0.12.6","superset-helm-chart-0.12.7","superset-helm-chart-0.12.8","superset-helm-chart-0.12.9","superset-helm-chart-0.13.1","superset-helm-chart-0.13.2","superset-helm-chart-0.13.3","superset-helm-chart-0.13.5","superset-helm-chart-0.13.6","superset-helm-chart-0.14.0","superset-helm-chart-0.14.1","superset-helm-chart-0.14.2","superset-helm-chart-0.14.3","superset-helm-chart-0.15.0","superset-helm-chart-0.2.0","superset-helm-chart-0.2.1","superset-helm-chart-0.3.0","superset-helm-chart-0.3.1","superset-helm-chart-0.3.10","superset-helm-chart-0.3.11","superset-helm-chart-0.3.12","superset-helm-chart-0.3.2","superset-helm-chart-0.3.3","superset-helm-chart-0.3.4","superset-helm-chart-0.3.5","superset-helm-chart-0.3.6","superset-helm-chart-0.3.7","superset-helm-chart-0.3.8","superset-helm-chart-0.3.9","superset-helm-chart-0.4.0","superset-helm-chart-0.5.0","superset-helm-chart-0.5.1","superset-helm-chart-0.5.10","superset-helm-chart-0.5.2","superset-helm-chart-0.5.3","superset-helm-chart-0.5.4","superset-helm-chart-0.5.5","superset-helm-chart-0.5.6","superset-helm-chart-0.5.7","superset-helm-chart-0.5.8","superset-helm-chart-0.5.9","superset-helm-chart-0.6.0","superset-helm-chart-0.6.1","superset-helm-chart-0.6.2","superset-helm-chart-0.6.3","superset-helm-chart-0.6.4","superset-helm-chart-0.6.5","superset-helm-chart-0.6.6","superset-helm-chart-0.7.0","superset-helm-chart-0.7.1","superset-helm-chart-0.7.2","superset-helm-chart-0.7.3","superset-helm-chart-0.7.4","superset-helm-chart-0.7.6","superset-helm-chart-0.7.7","superset-helm-chart-0.8.0","superset-helm-chart-0.8.1","superset-helm-chart-0.8.10","superset-helm-chart-0.8.2","superset-helm-chart-0.8.3","superset-helm-chart-0.8.4","superset-helm-chart-0.8.5","superset-helm-chart-0.8.6","superset-helm-chart-0.8.7","superset-helm-chart-0.8.8","superset-helm-chart-0.8.9","superset-helm-chart-0.9.0","superset-helm-chart-0.9.1","superset-helm-chart-0.9.2","superset-helm-chart-0.9.3","superset-helm-chart-0.9.4","test_tag","v2020.51.0","v2021.10.0","v2021.13.0","v2021.15.0","v2021.17.0","v2021.18.0","v2021.19.0","v2021.20.0","v2021.21.0","v2021.22.0","v2021.23.0","v2021.23.1","v2021.24.0","v2021.25.0","v2021.27.0","v2021.27.1","v2021.29.0","v2021.3.0","v2021.31.0","v2021.34.0","v2021.35.0","v2021.36.0","v2021.36.5","v2021.38.0","v2021.40.0","v2021.41.0","v2021.5.0","v2021.5.1","v2021.6.0","v2021.7.0","v2021.8.0","v2021.9.0","v2021.9.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23982.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}