Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <721f27f6-7330-4d79-1608-c8d7de6afbc8@apache.org>
Date: Fri, 17 Apr 2026 09:34:31 +0000
From: Mingyu Chen <morningman@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-66335: Apache Doris MCP Server: MCP SQL inject 

Severity: moderate 

Affected versions:

- Apache Doris MCP Server 0.1.0 before 0.6.1

Description:

Apache Doris MCP Server versions earlier than 0.6.1 are affected by an improper neutralization flaw in query context handling that may allow execution of unintended SQL statements and bypass of intended query validation and access restrictions through the MCP query execution interface. Version 0.6.1 and later are not affected.

Credit:

Tomer Peled, Senior Security Researcher at Akamai (reporter)

References:

https://doris.apache.org
https://www.cve.org/CVERecord?id=CVE-2025-66335

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.