5.4
CVSSv3

CVE-2023-43701

Published: 27/11/2023 Updated: 01/12/2023
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
VMScore: 0

Vulnerability Summary

Improper payload validation and an improper REST API response type, made it possible for an authenticated malicious actor to store malicious code into Chart's metadata, this code could get executed if a user specifically accesses a specific deprecated API endpoint. This issue affects Apache Superset versions before 2.1.2.  Users are recommended to upgrade to version 2.1.2, which fixes this issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache superset

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2023-43701: Apache Superset: Stored XSS on API endpoint <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Danie ...