
Cloud Vulnerability DB
A community-led vulnerabilities database
A high-severity authentication bypass vulnerability (CVE-2025-61733) was discovered in Apache Kylin, affecting versions 4.0.0 through 5.0.2. The vulnerability was disclosed on October 2, 2025, and is classified as an Authentication Bypass Using an Alternate Path or Channel vulnerability. Apache Kylin, a high-concurrency OLAP engine widely used for big data analytics, has addressed this security issue in version 5.0.3 (Apache Advisory, Security Online).
The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The vulnerability is categorized under CWE-288 (Authentication Bypass Using an Alternate Path or Channel). This classification indicates that the flaw could allow attackers to bypass authentication mechanisms entirely (NVD).
Given Apache Kylin's role in large-scale analytics, this vulnerability poses a significant risk to enterprises relying on Kylin for business intelligence. The successful exploitation of this vulnerability could grant unauthorized access to sensitive data or administrative functions within Kylin environments (Security Online).
Users are strongly advised to upgrade to Apache Kylin version 5.0.3, which includes fixes for this vulnerability. This is the primary and recommended mitigation strategy provided by the Apache Software Foundation (Apache Advisory, Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."