Anonymous Intelligence Signal

Apache Superset CLI Extension Exposes HIGH-Severity Jinja2 XSS Vulnerability (B701)

human The Lab unverified 2026-04-13 03:22:34 Source: GitHub Issues

A high-severity security vulnerability has been flagged within the Apache Superset ecosystem, exposing a potential cross-site scripting (XSS) attack vector. The flaw, identified as B701 by the Bandit security scanner, resides in the `superset-extensions-cli` tool, specifically at line 834 of the `cli.py` file. The core issue is the use of Jinja2 templates with `autoescape=False` as the default setting, which fails to sanitize user input and could allow malicious code injection.

The vulnerability is classified under CWE-94 (Improper Control of Generation of Code) and carries a HIGH severity rating. The affected component is a command-line interface tool designed for extending the popular Apache Superset business intelligence platform. This creates a direct path for exploitation if untrusted data is rendered through the vulnerable template engine, potentially compromising the security of systems using this extension.

While a remediation plan is noted—with an individual named Devin assigned to investigate and submit a fix—the presence of such a critical flaw in a tool associated with a major data visualization platform raises immediate security concerns. Organizations and developers utilizing `superset-extensions-cli` are exposed until the patch is applied. The finding underscores the persistent risk of template injection vulnerabilities in extensible software tools and the critical need for secure default configurations in widely adopted libraries like Jinja2.