
We found results for “”
CVE-2025-61735
Good to know:



Date: October 2, 2025
Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin. This issue affects Apache Kylin: from 4.0.0 through 5.0.2. You are fine as long as the Kylin's system and project admin access is well protected. Users are recommended to upgrade to version 5.0.3, which fixes the issue.
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Server-Side Request Forgery (SSRF)
CWE-918Top Fix

Upgrade Version
Upgrade to version org.apache.kylin:kylin-common-server:5.0.3;org.apache.kylin:kylin-common-service:5.0.3;org.apache.kylin:kylin-core-common:5.0.3;org.apache.kylin:kylin-core-metadata:5.0.3;org.apache.kylin:kylin-ops-server:5.0.3;org.apache.kylin:kylin-server:5.0.3;org.apache.kylin:kylin-tool:5.0.3;org.apache.kylin:kylin:5.0.3;https://github.com/apache/kylin.git - kylin-5.0.3
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | LOW |
Availability (A): | LOW |