CVE-2025-61733: Apache Kylin Authentication Bypass Vulnerability
7.5
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.kylin:kylin | maven | >= 4.0.0, < 5.0.3 | 5.0.3 |
| org.apache.kylin:kylin-core-common | maven | >= 4.0.0, < 5.0.3 | 5.0.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis of the provided patch clearly indicates that the vulnerability lies within the updateUserWithoutAuth method of the NUserController class. The patch removes this method entirely, along with the security configurations that exposed it publicly. The method's name itself, updateUserWithoutAuth, is a strong indicator of its purpose. The changes in kylinSecurity.xml and SecurityConfig.java confirm that the endpoint /api/user/update_user was intentionally left without authentication. An attacker could exploit this by sending a crafted request to this endpoint to modify user accounts, bypassing authentication mechanisms. The removal of the corresponding client function updateUser in RestClient.java further corroborates that this functionality was being removed to fix the security issue.
Vulnerable functions
org.apache.kylin.rest.controller.NUserController.updateUserWithoutAuthsrc/metadata-server/src/main/java/org/apache/kylin/rest/controller/NUserController.java
org.apache.kylin.tool.restclient.RestClient.updateUsersrc/core-common/src/main/java/org/apache/kylin/tool/restclient/RestClient.java