Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Kylin.
This issue affects Apache Kylin: from 4.0.0 through 5.0.2.
Users are recommended to upgrade to version 5.0.3, which fixes the issue.
                
            References
                    | Link | Resource | 
|---|---|
| https://lists.apache.org/thread/8wmcffly6gp50nmfw8j4w3hlmv843yo0 | Vendor Advisory Issue Tracking | 
Configurations
                    History
                    03 Oct 2025, 18:51
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://lists.apache.org/thread/8wmcffly6gp50nmfw8j4w3hlmv843yo0 - Vendor Advisory, Issue Tracking | |
| First Time | Apache kylin Apache | |
| CPE | cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:* | 
02 Oct 2025, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.5 | 
02 Oct 2025, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-10-02 10:15
Updated : 2025-10-03 18:51
NVD link : CVE-2025-61733
Mitre link : CVE-2025-61733
CVE.ORG link : CVE-2025-61733
JSON object : View
Products Affected
                apache
- kylin
CWE
                
                    
                        
                        CWE-288
                        
            Authentication Bypass Using an Alternate Path or Channel
