An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).
History

Thu, 06 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache doris
Vendors & Products Apache
Apache doris

Wed, 05 Nov 2025 11:30:00 +0000

Type Values Removed Values Added
References

Wed, 05 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
Description An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).
Title Apache Doris-MCP-Server: Improper Access Control results in bypassing a "read-only" mode for doris-mcp-server MCP Server
Weaknesses CWE-284
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-11-05T09:26:36.573Z

Updated: 2025-11-06T15:55:05.901Z

Reserved: 2025-08-29T01:50:06.048Z

Link: CVE-2025-58337

cve-icon Vulnrichment

Updated: 2025-11-05T10:06:00.686Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-05T10:15:36.483

Modified: 2025-11-06T19:45:30.990

Link: CVE-2025-58337

cve-icon Redhat

No data.