Anonymous Intelligence Signal

Apache Superset CLI Extension Exposes HIGH-Severity Jinja2 XSS Vulnerability (B701)

human The Lab unverified 2026-04-14 04:22:36 Source: GitHub Issues

A critical security flaw has been identified in the Apache Superset extensions command-line tool, exposing the platform to potential cross-site scripting (XSS) attacks. The vulnerability, flagged as HIGH severity by the Bandit security scanner, stems from the Jinja2 templating engine's default configuration of `autoescape=False` within the core CLI code. This setting fails to sanitize user-controlled input before rendering it in templates, creating a direct injection path for malicious scripts.

The specific vulnerability, cataloged as CWE-94 (Improper Control of Generation of Code), is located in the file `superset-extensions-cli/src/superset_extensions_cli/cli.py` at line 834. The finding (B701) indicates that the Jinja2 environment was not explicitly configured with `autoescape=True` or the `select_autoescape()` function, leaving rendered content unprotected. This oversight in a core administrative tool for the widely-used business intelligence platform Apache Superset represents a significant attack surface, as CLI tools often handle configuration and system data.

Remediation is assigned to a developer named Devin, who is tasked with investigating, implementing a fix, and opening a pull request. The presence of such a basic yet high-severity templating vulnerability in an extension of a major data visualization project triggers immediate scrutiny of the project's security review and dependency management practices. It raises questions about the security posture of the broader Superset ecosystem and the potential for similar unpatched issues in other extensions or plugins that leverage Jinja2.