Description
An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).
INFO
Published Date :
2025-11-05T09:26:36.573Z
Last Modified :
2025-11-06T15:55:05.901Z
Source :
apache
AFFECTED PRODUCTS
The following products are affected by CVE-2025-58337 vulnerability.
| Vendors | Products |
|---|---|
| Apache |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-58337.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact