Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server

0
Medium
VulnerabilityCVE-2025-58337cvecve-2025-58337cwe-284
Published: Wed Nov 05 2025 (11/05/2025, 09:26:36 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Doris-MCP-Server

Description

An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).

AI-Powered Analysis

AILast updated: 11/12/2025, 10:36:14 UTC

Technical Analysis

CVE-2025-58337 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Apache Doris-MCP-Server version 0.1.0. The flaw allows an attacker who already possesses a valid read-only account to bypass the server’s read-only mode restrictions. Normally, read-only accounts should be restricted from making any modifications to the system or data. However, due to improper access control implementation, these accounts can perform unauthorized write or modification operations that should have been blocked. The vulnerability is remotely exploitable without user interaction and requires only low privileges (read-only access), making exploitation relatively straightforward once credentials are obtained. The CVSS v3.1 base score is 5.4 (medium severity), reflecting limited confidentiality and integrity impact, no availability impact, low attack complexity, and no user interaction. The vulnerability does not affect confidentiality significantly but compromises data integrity by allowing unauthorized changes. The issue was identified and fixed in Apache Doris-MCP-Server version 0.6.0, and operators are urged to upgrade immediately to mitigate the risk. No public exploits or active exploitation have been reported as of now. This vulnerability highlights the importance of strict access control enforcement, especially in systems managing critical data analytics workloads.

Potential Impact

For European organizations, the primary impact of CVE-2025-58337 lies in the potential unauthorized modification of data or configurations within Apache Doris-MCP-Server environments. This can lead to data integrity issues, undermining trust in analytics results or operational decisions based on corrupted data. While confidentiality and availability are less affected, the integrity breach could disrupt business intelligence, reporting, and decision-making processes. Organizations in sectors such as finance, telecommunications, manufacturing, and government that rely on Apache Doris for big data analytics or real-time data processing may face operational risks and compliance challenges if unauthorized changes go undetected. The vulnerability could also be leveraged as a foothold for further internal attacks if attackers escalate privileges after bypassing read-only restrictions. Given the medium severity and ease of exploitation with valid credentials, the threat is significant for environments where read-only accounts are widely used or shared. Failure to patch promptly could expose organizations to insider threats or credential compromise scenarios leading to unauthorized data manipulation.

Mitigation Recommendations

1. Upgrade Apache Doris-MCP-Server to version 0.6.0 immediately, as this release contains the official fix for CVE-2025-58337. 2. Audit and restrict the issuance of read-only accounts, ensuring they are granted only to trusted users and systems. 3. Implement strict monitoring and alerting on any modification attempts from read-only accounts to detect potential exploitation early. 4. Employ network segmentation and access controls to limit exposure of the Doris-MCP-Server to only necessary users and systems. 5. Use multi-factor authentication (MFA) for all accounts, including read-only users, to reduce the risk of credential compromise. 6. Regularly review and update access control policies and permissions to enforce the principle of least privilege rigorously. 7. Conduct periodic security assessments and penetration testing focusing on access control mechanisms within Apache Doris deployments. 8. Maintain comprehensive logging and audit trails for all user activities to facilitate forensic investigations if unauthorized modifications are suspected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-08-29T01:50:06.048Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690b1bd197eccd907387bdd2

Added to database: 11/5/2025, 9:41:37 AM

Last enriched: 11/12/2025, 10:36:14 AM

Last updated: 12/20/2025, 4:26:29 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats