Wiz Agents & Workflows are here
Vulnerability DatabaseGHSA-47qg-q58v-7vrp

GHSA-47qg-q58v-7vrp
Python vulnerability analysis and mitigation

Overview

A security vulnerability was identified in amundsen-frontend (Python package) versions 2.3.0 and 3.0.0, tracked as GHSA-47qg-q58v-7vrp. The vulnerability relates to the improper implementation of table and column description editing restrictions, where the UNEDITABLE_SCHEMAS and UNEDITABLE_TABLE_DESCRIPTION_MATCH_RULES configuration settings were not being respected by the frontend service backend. The issue was discovered and disclosed on December 2, 2020, and was patched in version 3.1.0 (GitHub Advisory).

Technical details

The vulnerability stems from the frontend service backend not properly enforcing the UNEDITABLE_SCHEMAS and UNEDITABLE_TABLE_DESCRIPTION_MATCH_RULES configuration settings. While the UI correctly displayed these restrictions by disabling inline editors, the backend API endpoints still allowed modifications to table and column descriptions. The issue was specifically located in the put_table_description and put_column_description endpoints, which lacked the necessary validation checks against these configuration parameters (GitHub Advisory).

Impact

Any installation that had UNEDITABLE_SCHEMAS and/or UNEDITABLE_TABLE_DESCRIPTION_MATCH_RULES configured in the front-end was affected. The vulnerability allowed any user to modify table and column descriptions through direct API calls, even when these modifications should have been restricted based on the configuration settings (GitHub Advisory).

Mitigation and workarounds

The issue was patched in version 3.1.0 of amundsen-frontend. The fix implemented proper validation checks in the backend API endpoints to respect the UNEDITABLE_SCHEMAS and UNEDITABLE_TABLE_DESCRIPTION_MATCH_RULES configuration settings. Users should upgrade to version 3.1.0 or later to address this vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-33641HIGH7.8
  • PythonPython
  • glances
NoNoApr 02, 2026
CVE-2026-34591HIGH7.1
  • PythonPython
  • poetry
NoYesApr 02, 2026
CVE-2026-33533HIGH7.1
  • PythonPython
  • glances
NoNoApr 02, 2026
CVE-2026-34730MEDIUM5.5
  • PythonPython
  • copier
NoYesApr 02, 2026
CVE-2026-34726MEDIUM4.4
  • PythonPython
  • copier
NoYesApr 02, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management