ClickHouse MySQL client before versions 1.1.54390 had "LOAD DATA LOCAL INFILE" functionality enabled that allowed a malicious MySQL database read arbitrary files from the connected ClickHouse server.
                
            References
                    | Link | Resource | 
|---|---|
| https://clickhouse.yandex/docs/en/security_changelog/ | Release Notes Vendor Advisory | 
| https://clickhouse.yandex/docs/en/security_changelog/ | Release Notes Vendor Advisory | 
Configurations
                    History
                    25 Jun 2025, 20:48
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Clickhouse clickhouse Clickhouse | |
| CPE | cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:* | 
21 Nov 2024, 03:49
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://clickhouse.yandex/docs/en/security_changelog/ - Release Notes, Vendor Advisory | 
Information
                Published : 2019-08-15 18:15
Updated : 2025-06-25 20:48
NVD link : CVE-2018-14669
Mitre link : CVE-2018-14669
CVE.ORG link : CVE-2018-14669
JSON object : View
Products Affected
                clickhouse
- clickhouse
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
