Security News > 2023 > April > Apache Superset Vulnerability: Insecure Default Configuration Exposes Servers to RCE Attacks

The maintainers of the Apache Superset open source data visualization software have released fixes to plug an insecure default configuration that could lead to remote code execution.
Ai, described the issue as "a dangerous default configuration in Apache Superset that allows an unauth attacker to gain remote code execution, harvest credentials, and compromise data."
It's worth noting that the flaw does not affect Superset instances that have changed the default value for the SECRET KEY config to a more cryptographically secure random string.
The cybersecurity firm, which found that the SECRET KEY is defaulted to the value "x02x01thisismyscretkeyx01x02eyyh" at install time, said that 918 out of 1,288 publicly-accessible servers were using the default configuration in October 2021.
Following responsible disclosure to the Apache security team a second time, a new update was released on April 5, 2023, to plug the security hole by preventing the server from starting up altogether if it's configured with the default SECRET KEY. UPCOMING WEBINAR. Zero Trust + Deception: Learn How to Outsmart Attackers!
"The docker-compose file contains a new default SECRET KEY of TEST NON DEV SECRET that we suspect some users will unwittingly run Superset with. Some configurations also set admin/admin as the default credential for the admin user."
News URL
https://thehackernews.com/2023/04/apache-superset-vulnerability-insecure.html
Related news
- Samsung MagicINFO 9 Server RCE flaw now exploited in attacks (source)
- Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability (source)
- Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence (source)
- New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks (source)
- Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054) (source)
- Active! Mail RCE flaw exploited in attacks on Japanese orgs (source)
- Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028) (source)
- Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers (source)
- Craft CMS RCE exploit chain used in zero-day attacks to steal data (source)
- Hitachi Vantara takes servers offline after Akira ransomware attack (source)