Files or Directories Accessible to External Parties vulnerability in Apache Kylin. You are fine as long as the Kylin's system and project admin access is well protected. This issue affects Apache Kylin: from 4.0.0 through 5.0.2. Users are recommended to upgrade to version 5.0.3, which fixes the issue.
History

Fri, 03 Oct 2025 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*

Fri, 03 Oct 2025 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache kylin
Vendors & Products Apache
Apache kylin

Thu, 02 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Oct 2025 10:00:00 +0000

Type Values Removed Values Added
Description Files or Directories Accessible to External Parties vulnerability in Apache Kylin. You are fine as long as the Kylin's system and project admin access is well protected. This issue affects Apache Kylin: from 4.0.0 through 5.0.2. Users are recommended to upgrade to version 5.0.3, which fixes the issue.
Title Apache Kylin: improper restriction of file read
Weaknesses CWE-552
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-10-02T09:47:15.317Z

Updated: 2025-10-02T17:26:38.587Z

Reserved: 2025-09-30T15:33:31.219Z

Link: CVE-2025-61734

cve-icon Vulnrichment

Updated: 2025-10-02T17:26:33.242Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-02T10:15:40.100

Modified: 2025-10-03T18:51:22.307

Link: CVE-2025-61734

cve-icon Redhat

No data.