Files or Directories Accessible to External Parties vulnerability in Apache Kylin.
You are fine as long as the Kylin's system and project admin access is well protected.
This issue affects Apache Kylin: from 4.0.0 through 5.0.2.
Users are recommended to upgrade to version 5.0.3, which fixes the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Oct 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:* |
Fri, 03 Oct 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache kylin |
|
Vendors & Products |
Apache
Apache kylin |
Thu, 02 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 02 Oct 2025 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Files or Directories Accessible to External Parties vulnerability in Apache Kylin. You are fine as long as the Kylin's system and project admin access is well protected. This issue affects Apache Kylin: from 4.0.0 through 5.0.2. Users are recommended to upgrade to version 5.0.3, which fixes the issue. | |
Title | Apache Kylin: improper restriction of file read | |
Weaknesses | CWE-552 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-10-02T09:47:15.317Z
Updated: 2025-10-02T17:26:38.587Z
Reserved: 2025-09-30T15:33:31.219Z
Link: CVE-2025-61734

Updated: 2025-10-02T17:26:33.242Z

Status : Analyzed
Published: 2025-10-02T10:15:40.100
Modified: 2025-10-03T18:51:22.307
Link: CVE-2025-61734

No data.