This issue affects Apache Kylin: from 4.0.0 through 5.0.2.
Users are recommended to upgrade to version 5.0.3, which fixes the issue.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-32089 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Kylin. This issue affects Apache Kylin: from 4.0.0 through 5.0.2. Users are recommended to upgrade to version 5.0.3, which fixes the issue. |
![]() |
GHSA-mr9j-4j48-xcm2 | Apache Kylin Authentication Bypass Vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Oct 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:* |
Fri, 03 Oct 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache kylin |
|
Vendors & Products |
Apache
Apache kylin |
Thu, 02 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 02 Oct 2025 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Kylin. This issue affects Apache Kylin: from 4.0.0 through 5.0.2. Users are recommended to upgrade to version 5.0.3, which fixes the issue. | |
Title | Apache Kylin: Authentication bypass | |
Weaknesses | CWE-288 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-10-03T03:55:30.699Z
Reserved: 2025-09-30T15:10:07.939Z
Link: CVE-2025-61733

Updated: 2025-10-02T17:25:33.869Z

Status : Analyzed
Published: 2025-10-02T10:15:39.930
Modified: 2025-10-03T18:51:58.627
Link: CVE-2025-61733

No data.

Updated: 2025-10-03T08:22:55Z