Apache Doris
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Apache Doris.
By the Year
In 2025 there have been 1 vulnerability in Apache Doris. Last year, in 2024 Doris had 3 security vulnerabilities published. Right now, Doris is on track to have less security vulnerabilities in 2025 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2025 | 1 | 0.00 |
| 2024 | 3 | 0.00 |
| 2023 | 1 | 8.20 |
| 2022 | 1 | 7.50 |
It may take a day or so for new Doris vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Apache Doris Security Vulnerabilities
Apache Doris Path Traversal Arbitrary File Read (Fixed v2.1.8 / v3.0.3)
CVE-2024-48019
- February 04, 2025
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Files or Directories Accessible to External Parties vulnerability in Apache Doris. Application administrators can read arbitrary files from the server filesystem through path traversal. Users are recommended to upgrade to version 2.1.8, 3.0.3 or later, which fixes the issue.
Directory traversal
Apache Doris JDBC Driver Unchecked Code Exec (pre-2.0.5/2.1.x)
CVE-2024-27438
- March 21, 2024
Download of Code Without Integrity Check vulnerability in Apache Doris. The jdbc driver files used for JDBC catalog is not checked and may resulting in remote command execution. Once the attacker is authorized to create a JDBC catalog, he/she can use arbitrary driver jar file with unchecked code snippet. This code snippet will be run when catalog is initializing without any check. This issue affects Apache Doris: from 1.2.0 through 2.0.4. Users are recommended to upgrade to version 2.0.5 or 2.1.x, which fixes the issue.
Download of Code Without Integrity Check
Apache Doris Race Condition in chmod() before 1.2.8/2.0.4
CVE-2024-26307
- March 21, 2024
Possible race condition vulnerability in Apache Doris. Some of code using `chmod()` method. This method run the risk of someone renaming the file out from under user and chmodding the wrong file. This could theoretically happen, but the impact would be minimal. This issue affects Apache Doris: before 1.2.8, before 2.0.4. Users are recommended to upgrade to version 2.0.4, which fixes the issue.
Race Condition
Apache Doris <2.0.0 Auth Timing Attack
CVE-2023-41313
- March 12, 2024
The authentication method in Apache Doris versions before 2.0.0 was vulnerable to timing attacks. Users are recommended to upgrade to version 2.0.0 + or 1.2.8, which fixes this issue.
Observable Timing Discrepancy
FE Node 2.0.3 Unauth /api/snapshot & /api/get_log_file (DoS/File)
CVE-2023-41314
8.2 - High
- December 18, 2023
The api /api/snapshot and /api/get_log_file would allow unauthenticated access. It could allow a DoS attack or get arbitrary files from FE node. Please upgrade to 2.0.3 to fix these issues.
AuthZ
Apache Doris, prior to 1.0.0, used a hardcoded key and IV to initialize the cipher used for ldap password
CVE-2022-23942
7.5 - High
- April 26, 2022
Apache Doris, prior to 1.0.0, used a hardcoded key and IV to initialize the cipher used for ldap password, which may lead to information disclosure.
Use of Hard-coded Credentials
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Apache Doris or by Apache? Click the Watch button to subscribe.