Description
An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions.


Impact:

Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications.




Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).
Published: 2025-11-05
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-m35w-xx8c-6xc7 Apache Doris-MCP-Server: Improper Access Control results in bypassing a "read-only" mode
History

Wed, 12 Nov 2025 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache doris Mcp Server
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:apache:doris_mcp_server:*:*:*:*:*:*:*:*
Vendors & Products Apache doris Mcp Server

Thu, 06 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache doris
Vendors & Products Apache
Apache doris

Wed, 05 Nov 2025 11:30:00 +0000

Type Values Removed Values Added
References

Wed, 05 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
Description An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).
Title Apache Doris-MCP-Server: Improper Access Control results in bypassing a "read-only" mode for doris-mcp-server MCP Server
Weaknesses CWE-284
References

Subscriptions

Apache Doris Doris Mcp Server
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-11-06T15:55:05.901Z

Reserved: 2025-08-29T01:50:06.048Z

Link: CVE-2025-58337

cve-icon Vulnrichment

Updated: 2025-11-05T10:06:00.686Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-05T10:15:36.483

Modified: 2025-11-12T20:51:18.687

Link: CVE-2025-58337

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-06T10:07:19Z

Weaknesses