Overly broad CORS configuration
Description
In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Kylin's CORS configuration allows cross-origin requests with credentials from any origin, enabling potential credential theft or unauthorized API access.
Vulnerability
Apache Kylin versions 2.6.6 and prior, 3.1.2 and prior, and 4.0.0 and prior contain an overly broad Cross-Origin Resource Sharing (CORS) configuration. The server reflects the Origin header in the Access-Control-Allow-Origin response and sets Access-Control-Allow-Credentials to true, allowing cross-origin requests with credentials from any origin [1][3]. No special configuration is required to reach the vulnerable code path, as this is the default CORS policy.
Exploitation
An attacker hosting a malicious website can craft a preflight OPTIONS request to a Kylin endpoint, which will be responded to with the reflected origin and credentials allowed. Subsequent authenticated requests from the attacker’s site can include Kylin session cookies or other credentials, enabling cross-origin data access. The attacker needs no prior authentication to Kylin; they only need to lure a logged-in Kylin user to visit the malicious site [3].
Impact
Successful exploitation allows the attacker to perform actions on the Kylin API as the victim user, potentially leading to unauthorized information disclosure, data modification, or other operations depending on the victim’s privileges. Since credentials are forwarded, any API endpoint that the victim can access may be invoked cross-origin.
Mitigation
A fix has been proposed in pull request #1781 on GitHub to restrict the CORS configuration [4]. As of the publication date (2022-01-06), a patched version has not been released. Administrators should restrict the Access-Control-Allow-Origin header to trusted origins, for example by configuring a whitelist in the Kylin server settings. This CVE is not listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.kylin:kylinMaven | < 3.1.3 | 3.1.3 |
org.apache.kylin:kylinMaven | >= 4.0.0, < 4.0.1 | 4.0.1 |
Affected products
2- Apache Software Foundation/Apache Kylinv5Range: Apache Kylin 2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-mgpf-hhgf-cxg4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-45457ghsaADVISORY
- www.openwall.com/lists/oss-security/2022/01/06/2ghsamailing-listx_refsource_MLISTWEB
- github.com/apache/kylin/pull/1781ghsaWEB
- github.com/apache/kylin/pull/1782ghsaWEB
- lists.apache.org/thread/rzv4mq58okwj1n88lry82ol2wwm57q1mghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.