Apache Superset <6.0.0: Authenticated DS Exposure via Tag Endpoint
CVE-2026-23983 Published on February 24, 2026

Apache Superset: Sensitive Data Exposure via REST API (disabled by default)
A Sensitive Data Exposure vulnerability exists in Apache Superset allowing authenticated users to retrieve sensitive user information. The Tag endpoint (disabled by default) allows users to retrieve a list of objects associated with a specific tag. When these associated objects include Users, the API response improperly serializes and returns sensitive fields, including password hashes (pbkdf2), email addresses, and login statistics. This vulnerability allows authenticated users with low privileges (e.g., Gamma role) to view sensitive authentication data This issue affects Apache Superset: before 6.0.0. Users are recommended to upgrade to version 6.0.0, which fixes the issue or make sure TAGGING_SYSTEM is False (Apache Superset current default)

Vendor Advisory NVD

Weakness Type

What is an Information Disclosure Vulnerability?

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CVE-2026-23983 has been classified to as an Information Disclosure vulnerability or weakness.


Products Associated with CVE-2026-23983

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2026-23983 are published in Apache Superset:

 

Affected Versions

Apache Software Foundation Apache Superset: