Логотип exploitDog
bind:CVE-2025-58337
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-58337

Количество 2

Количество 2

nvd логотип

CVE-2025-58337

3 месяца назад

An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-m35w-xx8c-6xc7

3 месяца назад

Apache Doris-MCP-Server: Improper Access Control results in bypassing a "read-only" mode

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-58337

An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).

CVSS3: 5.4
0%
Низкий
3 месяца назад
github логотип
GHSA-m35w-xx8c-6xc7

Apache Doris-MCP-Server: Improper Access Control results in bypassing a "read-only" mode

0%
Низкий
3 месяца назад

Уязвимостей на страницу