CVE-2025-66335 Overview
CVE-2025-66335 is an SQL Injection vulnerability affecting Apache Doris MCP Server versions prior to 0.6.1. The flaw stems from improper neutralization of special elements in query context handling within the MCP query execution interface. Attackers can exploit this vulnerability to execute unintended SQL statements and bypass intended query validation and access restrictions, potentially leading to unauthorized data access.
Critical Impact
Successful exploitation allows attackers to bypass query validation controls and execute arbitrary SQL statements through the MCP query execution interface, potentially exposing sensitive database information.
Affected Products
- Apache Doris MCP Server versions earlier than 0.6.1
Discovery Timeline
- 2026-04-20 - CVE-2025-66335 published to NVD
- 2026-04-22 - Last updated in NVD database
Technical Details for CVE-2025-66335
Vulnerability Analysis
This vulnerability is classified as CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), commonly known as SQL Injection. The flaw exists in Apache Doris MCP Server's query context handling mechanism, where user-supplied input is not properly sanitized before being incorporated into SQL queries.
The vulnerability allows network-based attackers to craft malicious input that bypasses the intended query validation logic. When processed by the MCP query execution interface, this malicious input can modify the structure of SQL queries, enabling unauthorized database operations. The attack requires no authentication or user interaction, making it particularly dangerous for internet-facing deployments.
Root Cause
The root cause is improper neutralization of special SQL characters and sequences within the query context handling component. The MCP Server fails to adequately validate and sanitize input parameters before constructing SQL statements, allowing attackers to inject additional SQL syntax that alters query behavior.
Attack Vector
The vulnerability is exploitable over the network through the MCP query execution interface. An attacker can submit specially crafted queries containing SQL injection payloads that:
- Escape the intended query context through improper input handling
- Inject additional SQL clauses that bypass access restrictions
- Execute unauthorized SELECT, INSERT, UPDATE, or DELETE operations depending on the database user's privileges
The attack does not require authentication or user interaction. The vulnerability primarily impacts confidentiality by allowing unauthorized read access to database contents, though the scope is limited to the privileges of the database connection used by the MCP Server.
Detection Methods for CVE-2025-66335
Indicators of Compromise
- Unusual or malformed SQL queries appearing in database logs originating from the MCP Server
- Unexpected data access patterns or queries targeting tables outside normal application scope
- Error messages in application logs indicating SQL syntax errors from user input processing
- Anomalous query response times indicating time-based SQL injection attempts
Detection Strategies
- Monitor MCP Server access logs for requests containing common SQL injection patterns (e.g., UNION SELECT, OR 1=1, single quotes, comment sequences)
- Implement database activity monitoring to detect queries that deviate from expected application behavior
- Deploy web application firewalls (WAF) with SQL injection detection rules in front of the MCP query interface
- Enable detailed query logging on the Apache Doris database to capture and analyze executed statements
Monitoring Recommendations
- Configure alerting for high-volume query failures or syntax errors that may indicate injection attempts
- Implement anomaly detection for database query patterns to identify unusual data access
- Monitor network traffic to the MCP Server for suspicious payload characteristics
- Review audit logs regularly for evidence of data exfiltration or unauthorized access attempts
How to Mitigate CVE-2025-66335
Immediate Actions Required
- Upgrade Apache Doris MCP Server to version 0.6.1 or later immediately
- Review access controls and network segmentation for MCP Server deployments
- Audit database logs for any evidence of exploitation prior to patching
- Consider temporarily disabling the MCP query execution interface if upgrade is not immediately possible
Patch Information
Apache has addressed this vulnerability in Apache Doris MCP Server version 0.6.1. Organizations should upgrade to this version or later to remediate the SQL injection flaw. For detailed information about the security fix, refer to the Apache Mailing List Thread and the Openwall OSS-Security Update.
Workarounds
- Restrict network access to the MCP query execution interface to trusted IP addresses only
- Implement a web application firewall with SQL injection filtering rules in front of the MCP Server
- Apply principle of least privilege to the database user account used by MCP Server to limit potential damage from successful exploitation
- Monitor and rate-limit incoming queries to detect and block automated injection attempts
# Example: Restrict MCP Server access via iptables
# Allow only trusted network ranges to access MCP Server port
iptables -A INPUT -p tcp --dport 8080 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 8080 -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

