CVE-2025-58337
05.11.2025, 10:15
An attacker with a valid read-only account can bypass Doris MCP Servers read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).Enginsight
| Vendor | Product | Version |
|---|---|---|
| apache | doris_mcp_server | 𝑥 < 0.6.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration