Apache Kyuubi LocalDir AllowList Bypass (v1.6.0-1.10.2)
CVE-2025-66518 Published on January 5, 2026

Apache Kyuubi: Unauthorized directory access due to missing path normalization
Any client who can access to Apache Kyuubi Server via Kyuubi frontend protocols can bypass server-side config kyuubi.session.local.dir.allow.list and use local files which are not listed in the config. This issue affects Apache Kyuubi: from 1.6.0 through 1.10.2. Users are recommended to upgrade to version 1.10.3 or upper, which fixes the issue.

Vendor Advisory NVD

Weakness Type

Path Traversal: 'dir/../../filename'

The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize multiple internal "../" sequences that can resolve to a location that is outside of that directory.


Affected Versions

Apache Software Foundation Apache Kyuubi:

Exploit Probability

EPSS
0.02%
Percentile
5.92%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.