Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin.
This issue affects Apache Kylin: from 4.0.0 through 5.0.2. You are fine as long as the Kylin's system and project admin access is well protected.
Users are recommended to upgrade to version 5.0.3, which fixes the issue.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/yscobmx869zvprsykb94r24jtmb58ckh | Vendor Advisory Issue Tracking |
Configurations
History
03 Oct 2025, 18:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.apache.org/thread/yscobmx869zvprsykb94r24jtmb58ckh - Vendor Advisory, Issue Tracking | |
First Time |
Apache
Apache kylin |
|
CPE | cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:* |
02 Oct 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
02 Oct 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-02 10:15
Updated : 2025-10-03 18:50
NVD link : CVE-2025-61735
Mitre link : CVE-2025-61735
CVE.ORG link : CVE-2025-61735
JSON object : View
Products Affected
apache
- kylin
CWE
CWE-918
Server-Side Request Forgery (SSRF)