An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions.
Impact:
Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications.
Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).
Metrics
Affected Vendors & Products
References
History
Thu, 06 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 06 Nov 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache doris |
|
| Vendors & Products |
Apache
Apache doris |
Wed, 05 Nov 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 05 Nov 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix). | |
| Title | Apache Doris-MCP-Server: Improper Access Control results in bypassing a "read-only" mode for doris-mcp-server MCP Server | |
| Weaknesses | CWE-284 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published: 2025-11-05T09:26:36.573Z
Updated: 2025-11-06T15:55:05.901Z
Reserved: 2025-08-29T01:50:06.048Z
Link: CVE-2025-58337
Updated: 2025-11-05T10:06:00.686Z
Status : Awaiting Analysis
Published: 2025-11-05T10:15:36.483
Modified: 2025-11-06T19:45:30.990
Link: CVE-2025-58337
No data.