Improper Authentication Affecting superset-4.1 package, versions <4.1.4-r1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.06% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authentication vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-SUPERSET41-12673670
  • published16 Sept 2025
  • disclosed11 Sept 2025

Introduced: 11 Sep 2025

NewCVE-2025-58065  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

Upgrade Chainguard superset-4.1 to version 4.1.4-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream superset-4.1 package and not the superset-4.1 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Flask-AppBuilder is an application development framework. Prior to version 4.8.1, when Flask-AppBuilder is configured to use OAuth, LDAP, or other non-database authentication methods, the password reset endpoint remains registered and accessible, despite not being displayed in the user interface. This allows an enabled user to reset their password and be able to create JWT tokens even after the user is disabled on the authentication provider. Users should upgrade to Flask-AppBuilder version 4.8.1 or later to receive a fix. If immediate upgrade is not possible, manually disable password reset routes in the application configuration; implement additional access controls at the web server or proxy level to block access to the reset my password URL; and/or monitor for suspicious password reset attempts from disabled accounts.