Safety vulnerability ID: 65230
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Improper payload validation and an improper REST API response type made it possible for an authenticated malicious actor to store malicious code in Chart's metadata, this code could get executed if a user specifically accesses a specific deprecated API endpoint. This issue affects Apache Superset versions before 2.1.2.
Latest version: 4.1.1
A modern, enterprise-ready business intelligence web application
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application