An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions.
Impact:
Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications.
Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).
References
Configurations
No configuration.
History
06 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
05 Nov 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
05 Nov 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-05 10:15
Updated : 2025-11-06 19:45
NVD link : CVE-2025-58337
Mitre link : CVE-2025-58337
CVE.ORG link : CVE-2025-58337
JSON object : View
Products Affected
No product.
CWE
CWE-284
Improper Access Control
