CVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).
AI Analysis
Technical Summary
CVE-2025-58337 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Apache Doris-MCP-Server version 0.1.0. The flaw allows an attacker who already possesses a valid read-only account to bypass the server’s read-only mode restrictions. Normally, read-only accounts should be restricted from making any modifications to the system or data. However, due to improper access control implementation, these accounts can perform unauthorized write or modification operations that should have been blocked. The vulnerability is remotely exploitable without user interaction and requires only low privileges (read-only access), making exploitation relatively straightforward once credentials are obtained. The CVSS v3.1 base score is 5.4 (medium severity), reflecting limited confidentiality and integrity impact, no availability impact, low attack complexity, and no user interaction. The vulnerability does not affect confidentiality significantly but compromises data integrity by allowing unauthorized changes. The issue was identified and fixed in Apache Doris-MCP-Server version 0.6.0, and operators are urged to upgrade immediately to mitigate the risk. No public exploits or active exploitation have been reported as of now. This vulnerability highlights the importance of strict access control enforcement, especially in systems managing critical data analytics workloads.
Potential Impact
For European organizations, the primary impact of CVE-2025-58337 lies in the potential unauthorized modification of data or configurations within Apache Doris-MCP-Server environments. This can lead to data integrity issues, undermining trust in analytics results or operational decisions based on corrupted data. While confidentiality and availability are less affected, the integrity breach could disrupt business intelligence, reporting, and decision-making processes. Organizations in sectors such as finance, telecommunications, manufacturing, and government that rely on Apache Doris for big data analytics or real-time data processing may face operational risks and compliance challenges if unauthorized changes go undetected. The vulnerability could also be leveraged as a foothold for further internal attacks if attackers escalate privileges after bypassing read-only restrictions. Given the medium severity and ease of exploitation with valid credentials, the threat is significant for environments where read-only accounts are widely used or shared. Failure to patch promptly could expose organizations to insider threats or credential compromise scenarios leading to unauthorized data manipulation.
Mitigation Recommendations
1. Upgrade Apache Doris-MCP-Server to version 0.6.0 immediately, as this release contains the official fix for CVE-2025-58337. 2. Audit and restrict the issuance of read-only accounts, ensuring they are granted only to trusted users and systems. 3. Implement strict monitoring and alerting on any modification attempts from read-only accounts to detect potential exploitation early. 4. Employ network segmentation and access controls to limit exposure of the Doris-MCP-Server to only necessary users and systems. 5. Use multi-factor authentication (MFA) for all accounts, including read-only users, to reduce the risk of credential compromise. 6. Regularly review and update access control policies and permissions to enforce the principle of least privilege rigorously. 7. Conduct periodic security assessments and penetration testing focusing on access control mechanisms within Apache Doris deployments. 8. Maintain comprehensive logging and audit trails for all user activities to facilitate forensic investigations if unauthorized modifications are suspected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
Description
An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).
AI-Powered Analysis
Technical Analysis
CVE-2025-58337 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Apache Doris-MCP-Server version 0.1.0. The flaw allows an attacker who already possesses a valid read-only account to bypass the server’s read-only mode restrictions. Normally, read-only accounts should be restricted from making any modifications to the system or data. However, due to improper access control implementation, these accounts can perform unauthorized write or modification operations that should have been blocked. The vulnerability is remotely exploitable without user interaction and requires only low privileges (read-only access), making exploitation relatively straightforward once credentials are obtained. The CVSS v3.1 base score is 5.4 (medium severity), reflecting limited confidentiality and integrity impact, no availability impact, low attack complexity, and no user interaction. The vulnerability does not affect confidentiality significantly but compromises data integrity by allowing unauthorized changes. The issue was identified and fixed in Apache Doris-MCP-Server version 0.6.0, and operators are urged to upgrade immediately to mitigate the risk. No public exploits or active exploitation have been reported as of now. This vulnerability highlights the importance of strict access control enforcement, especially in systems managing critical data analytics workloads.
Potential Impact
For European organizations, the primary impact of CVE-2025-58337 lies in the potential unauthorized modification of data or configurations within Apache Doris-MCP-Server environments. This can lead to data integrity issues, undermining trust in analytics results or operational decisions based on corrupted data. While confidentiality and availability are less affected, the integrity breach could disrupt business intelligence, reporting, and decision-making processes. Organizations in sectors such as finance, telecommunications, manufacturing, and government that rely on Apache Doris for big data analytics or real-time data processing may face operational risks and compliance challenges if unauthorized changes go undetected. The vulnerability could also be leveraged as a foothold for further internal attacks if attackers escalate privileges after bypassing read-only restrictions. Given the medium severity and ease of exploitation with valid credentials, the threat is significant for environments where read-only accounts are widely used or shared. Failure to patch promptly could expose organizations to insider threats or credential compromise scenarios leading to unauthorized data manipulation.
Mitigation Recommendations
1. Upgrade Apache Doris-MCP-Server to version 0.6.0 immediately, as this release contains the official fix for CVE-2025-58337. 2. Audit and restrict the issuance of read-only accounts, ensuring they are granted only to trusted users and systems. 3. Implement strict monitoring and alerting on any modification attempts from read-only accounts to detect potential exploitation early. 4. Employ network segmentation and access controls to limit exposure of the Doris-MCP-Server to only necessary users and systems. 5. Use multi-factor authentication (MFA) for all accounts, including read-only users, to reduce the risk of credential compromise. 6. Regularly review and update access control policies and permissions to enforce the principle of least privilege rigorously. 7. Conduct periodic security assessments and penetration testing focusing on access control mechanisms within Apache Doris deployments. 8. Maintain comprehensive logging and audit trails for all user activities to facilitate forensic investigations if unauthorized modifications are suspected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2025-08-29T01:50:06.048Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690b1bd197eccd907387bdd2
Added to database: 11/5/2025, 9:41:37 AM
Last enriched: 11/12/2025, 10:36:14 AM
Last updated: 12/20/2025, 4:26:29 AM
Views: 126
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14735: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in nestornoe Amazon affiliate lite Plugin
MediumCVE-2025-14734: CWE-352 Cross-Site Request Forgery (CSRF) in nestornoe Amazon affiliate lite Plugin
MediumCVE-2025-14721: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mansoormunib RESPONSIVE AND SWIPE SLIDER!
MediumCVE-2025-14633: CWE-862 Missing Authorization in niao70 F70 Lead Document Download
MediumCVE-2025-14591: Vulnerability in Perforce Delphix Continuous Compliance
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.