CVE-2025-58337
MEDIUMDoris MCP Server <0.6.0 - Auth Bypass
Title source: llmDescription
An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix).
Scores
CVSS v3
5.4
EPSS
0.0012
EPSS Percentile
30.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Classification
CWE
CWE-284
Status
published
Affected Products (2)
apache/doris_mcp_server
< 0.6.0
pypi/doris-mcp-server
< 0.6.0PyPI
Timeline
Published
Nov 05, 2025
Tracked Since
Feb 18, 2026