Headline
GHSA-f6m8-qm7j-fh65: Apache Kylin Server-Side Request Forgery (SSRF) Vulnerability
Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin.
This issue affects Apache Kylin: from 4.0.0 through 5.0.2. You are fine as long as the Kylin’s system and project admin access is well protected.
Users are recommended to upgrade to version 5.0.3, which fixes the issue.
Skip to content
Navigation Menu
GitHub Copilot
Write better code with AI
GitHub Spark New
Build and deploy intelligent apps
GitHub Models New
Manage and compare prompts
GitHub Advanced Security
Find and fix vulnerabilities
Actions
Automate any workflow
* Codespaces
Instant dev environments
* Issues
Plan and track work
* Code Review
Manage code changes
* Discussions
Collaborate outside of code
* Code Search
Find more, search less
View all features
Explore
- Learning Pathways
- Events & Webinars
- Ebooks & Whitepapers
- Customer Stories
- Partners
- Executive Insights
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
Enterprise platform
AI-powered developer platform
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
Appearance settings
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-61735
Apache Kylin Server-Side Request Forgery (SSRF) Vulnerability
High severity GitHub Reviewed Published Oct 2, 2025 to the GitHub Advisory Database • Updated Oct 2, 2025
Package
maven org.apache.kylin:kylin (Maven)
Affected versions
>= 4.0.0, < 5.0.3
maven org.apache.kylin:kylin-common-server (Maven)
maven org.apache.kylin:kylin-common-service (Maven)
maven org.apache.kylin:kylin-core-common (Maven)
maven org.apache.kylin:kylin-core-metadata (Maven)
maven org.apache.kylin:kylin-ops-server (Maven)
maven org.apache.kylin:kylin-server (Maven)
Description
Published to the GitHub Advisory Database
Oct 2, 2025
EPSS score