CVE-2023-27524

8.9 HIGH CISA KEV - Actively Exploited
Published: April 24, 2023 Modified: October 23, 2025

Description

Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database. Add a strong SECRET_KEY to your `superset_config.py` file like: SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY> Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk
Source: security@apache.org
Mailing List Vendor Advisory
https://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html
Source: security@apache.org
Exploit Third Party Advisory VDB Entry
https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html
Source: security@apache.org
Exploit Third Party Advisory VDB Entry
https://www.openwall.com/lists/oss-security/2023/04/24/2
Source: security@apache.org
Mailing List
https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Vendor Advisory
https://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
https://www.openwall.com/lists/oss-security/2023/04/24/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-27524
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Third Party Advisory US Government Resource

9 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.9 / 10.0
EPSS (Exploit Probability)
84.1%
99th percentile
Exploitation Status
Actively Exploited
Remediation due: 2024-01-29

Weaknesses (CWE)

Affected Vendors

apache