Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin.
This issue affects Apache Kylin: from 4.0.0 through 5.0.2. You are fine as long as the Kylin's system and project admin access is well protected.
Users are recommended to upgrade to version 5.0.3, which fixes the issue.
                
            References
                    | Link | Resource | 
|---|---|
| https://lists.apache.org/thread/yscobmx869zvprsykb94r24jtmb58ckh | Vendor Advisory Issue Tracking | 
Configurations
                    History
                    03 Oct 2025, 18:50
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:* | |
| First Time | Apache kylin Apache | |
| References | () https://lists.apache.org/thread/yscobmx869zvprsykb94r24jtmb58ckh - Vendor Advisory, Issue Tracking | 
02 Oct 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.3 | 
02 Oct 2025, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-10-02 10:15
Updated : 2025-10-03 18:50
NVD link : CVE-2025-61735
Mitre link : CVE-2025-61735
CVE.ORG link : CVE-2025-61735
JSON object : View
Products Affected
                apache
- kylin
CWE
                
                    
                        
                        CWE-918
                        
            Server-Side Request Forgery (SSRF)
