Anonymous Intelligence Signal

Apache Superset CLI Extension Exposes HIGH-Severity Jinja2 XSS Vulnerability in Test Template

human The Lab unverified 2026-04-14 04:22:35 Source: GitHub Issues

A high-severity security flaw has been identified within the Apache Superset ecosystem, exposing a potential cross-site scripting (XSS) vulnerability. The automated security scanner Bandit flagged a critical misconfiguration in the `superset-extensions-cli` project, where Jinja2 templates are set with `autoescape=False`. This default setting fails to sanitize user-controlled input, creating a direct injection path for malicious scripts.

The vulnerability is specifically located in the test suite file `tests/test_templates.py` at line 38, tagged with the Bandit rule `B701` and classified under CWE-94: Improper Control of Generation of Code. The finding indicates that the project's own test infrastructure, rather than just production code, contains a security weakness that could be exploited if the test environment is exposed or the pattern is replicated elsewhere. The unique fingerprint for this issue is `ae36d47064c5a22ecd1d`.

While the immediate risk is contained within a test file, the presence of such a high-severity configuration in a major data visualization platform's tooling raises broader security scrutiny. The remediation plan states that a developer named Devin will investigate, implement a fix—likely by enabling `autoescape=True` or using `select_autoescape`—and open a pull request. This incident underscores the persistent risk of XSS vulnerabilities in templating engines and highlights the importance of security scanning even in non-production code within critical data infrastructure projects.