CVE-2025-61735

Apache · Apache Kylin

A high-severity vulnerability has been discovered in Apache Kylin that allows an attacker to force the server to make unauthorized requests to internal or external network resources.

Executive summary

A high-severity vulnerability has been discovered in Apache Kylin that allows an attacker to force the server to make unauthorized requests to internal or external network resources. Successful exploitation of this Server-Side Request Forgery (SSRF) flaw could lead to sensitive information disclosure, internal network scanning, and the potential compromise of other systems within the organization's infrastructure.

Vulnerability

This vulnerability is a Server-Side Request Forgery (SSRF). An attacker can exploit this flaw by sending a specially crafted request to a vulnerable component within the Apache Kylin application. The application fails to properly validate user-supplied input that contains a URL, allowing an attacker to trick the server into sending requests to arbitrary destinations. This can be used to scan internal networks, access internal services (such as databases or administrative interfaces), query cloud provider metadata services to steal credentials, or exfiltrate data to an attacker-controlled server.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.3. Exploitation can have significant business consequences, including the breach of sensitive corporate or customer data stored on internal systems accessible by the Kylin server. Attackers can leverage this vulnerability to perform internal network reconnaissance, bypassing perimeter security controls like firewalls, as the malicious requests originate from a trusted internal server. In cloud-hosted environments, this flaw could lead to a full infrastructure compromise if an attacker successfully accesses and exfiltrates cloud credentials from the instance metadata service.

Remediation

Immediate Action: Immediately apply the security updates provided by the Apache Software Foundation to all affected Apache Kylin instances. Prioritize patching for systems that are exposed to the internet. Following the update, review web server and application access logs for any signs of past or ongoing exploitation attempts.

Proactive Monitoring: Monitor egress network traffic from servers running Apache Kylin for any unusual or unauthorized outbound connections, especially to internal IP address ranges (e.g., 10.0.0.0/8, 192.168.0.0/16) or cloud metadata endpoints (169.254.169.254). Configure logging to record all outbound requests made by the application and audit these logs for suspicious URLs or IP addresses.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:

  • Egress Filtering: Use a firewall to strictly limit outbound network connections from the Apache Kylin server, allowing only connections to known and necessary services.
  • Web Application Firewall (WAF): Deploy a WAF with rules designed to detect and block common SSRF attack patterns in incoming requests.
  • Network Segmentation: Isolate the Apache Kylin server in a secured network segment to limit its ability to connect to critical internal assets.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.3) and the potential for significant data exposure and internal network compromise, this vulnerability requires immediate attention. While this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, organizations should treat it with urgency. We strongly recommend that all vulnerable Apache Kylin instances be identified and patched on an emergency basis. If patching must be delayed, the compensating controls outlined above, particularly strict egress filtering, should be implemented immediately to mitigate the risk of exploitation.