Superset Security Audit Patches Critical vm2 Sandbox Escape and Axios SSRF Flaws; One Vulnerability Remains Unfixed
A comprehensive security audit of Apache Superset has uncovered multiple critical and high-severity vulnerabilities across the codebase, prompting immediate remediation of two dangerous flaws while leaving one critical issue without an available fix. The audit, documented in a newly added SECURITY_AUDIT.md file, scanned the Python backend, frontend npm dependencies, Helm chart, and Docker configuration—revealing a concerning attack surface in the widely used data visualization platform.
The most severe finding involves vm2, a JavaScript sandbox library present as a transitive dependency through geostyler and typescript-json-schema. Version 3.10.5 carried a critical sandbox escape vulnerability that could allow attackers to break out of the sandbox and execute arbitrary code. The team addressed this by bumping vm2 to version 3.11.2 via npm overrides in superset-frontend/package.json. A second high-severity flaw was identified in axios version 1.15.0, exposing the application to Server-Side Request Forgery (SSRF) and credential leakage through the wait-on, nx, and jest-process-manager dependency chains. This was similarly patched by overriding to axios version 1.15.2 or higher.
However, the audit also flagged eslint-plugin-i18n-strings as carrying a critical advisory affecting all versions—with no remediation path currently available. This unresolved vulnerability leaves a persistent risk in the frontend tooling layer. The findings underscore the growing challenge of securing complex dependency trees in modern web applications, where transitive dependencies can introduce severe vulnerabilities far removed from direct development control. Organizations deploying Superset should review the audit documentation and verify that patched versions are running in production environments.