Open Redirect Affecting superset package, versions <4.1.2-r2


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.03% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-SUPERSET-10186886
  • published21 May 2025
  • disclosed16 May 2025

Introduced: 16 May 2025

NewCVE-2025-32962  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade Chainguard superset to version 4.1.2-r2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream superset package and not the superset package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 4.6.2 would allow for a malicious unauthenticated actor to perform an open redirect by manipulating the Host header in HTTP requests. Flask-AppBuilder 4.6.2 introduced the FAB_SAFE_REDIRECT_HOSTS configuration variable, which allows administrators to explicitly define which domains are considered safe for redirection. As a workaround, use a reverse proxy to enforce trusted host headers.