Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin.
This issue affects Apache Kylin: from 4.0.0 through 5.0.2. You are fine as long as the Kylin's system and project admin access is well protected.
Users are recommended to upgrade to version 5.0.3, which fixes the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 03 Oct 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:* |
Fri, 03 Oct 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache kylin |
|
| Vendors & Products |
Apache
Apache kylin |
Thu, 02 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Oct 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 02 Oct 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin. This issue affects Apache Kylin: from 4.0.0 through 5.0.2. You are fine as long as the Kylin's system and project admin access is well protected. Users are recommended to upgrade to version 5.0.3, which fixes the issue. | |
| Title | Apache Kylin: Server-Side Request Forgery | |
| Weaknesses | CWE-918 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published: 2025-10-02T09:47:49.948Z
Updated: 2025-11-04T21:14:09.199Z
Reserved: 2025-09-30T15:44:26.073Z
Link: CVE-2025-61735
Updated: 2025-11-04T21:14:09.199Z
Status : Modified
Published: 2025-10-02T10:15:40.250
Modified: 2025-11-04T22:16:37.160
Link: CVE-2025-61735
No data.