Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin.
This issue affects Apache Kylin: from 4.0.0 through 5.0.2. You are fine as long as the Kylin's system and project admin access is well protected.
Users are recommended to upgrade to version 5.0.3, which fixes the issue.
This issue affects Apache Kylin: from 4.0.0 through 5.0.2. You are fine as long as the Kylin's system and project admin access is well protected.
Users are recommended to upgrade to version 5.0.3, which fixes the issue.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 02 Oct 2025 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin. This issue affects Apache Kylin: from 4.0.0 through 5.0.2. You are fine as long as the Kylin's system and project admin access is well protected. Users are recommended to upgrade to version 5.0.3, which fixes the issue. | |
Title | Apache Kylin: Server-Side Request Forgery | |
Weaknesses | CWE-918 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-10-02T09:47:49.948Z
Reserved: 2025-09-30T15:44:26.073Z
Link: CVE-2025-61735

No data.

Status : Received
Published: 2025-10-02T10:15:40.250
Modified: 2025-10-02T10:15:40.250
Link: CVE-2025-61735

No data.

No data.