This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
References

No reference.

History

Fri, 04 Jul 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 03 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 03 Jul 2025 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-420
References
Metrics cvssV3_1

{'score': 2.8, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N'}


Thu, 03 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 03 Jul 2025 15:30:00 +0000

Type Values Removed Values Added
Description ClickHouse 25.7.1.557 allows low-privileged users to execute shell commands by querying existing Executable() tables created by higher-privileged users. Although the CREATE TABLE privilege is restricted, there is no access control preventing low-privileged users from invoking Executable tables already present in the system. If an attacker can influence the contents of the script referenced by the Executable() engine through writable paths, they may execute controlled commands in the context of the ClickHouse server, leading to privilege escalation and unauthorized code execution. NOTE: the Supplier's position is that these types of executions by low-privileged users are the expected behavior. This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

Mon, 23 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Jun 2025 17:00:00 +0000

Type Values Removed Values Added
Description ClickHouse 25.7.1.557 allows low-privileged users to execute shell commands by querying existing Executable() tables created by higher-privileged users. Although the CREATE TABLE privilege is restricted, there is no access control preventing low-privileged users from invoking Executable tables already present in the system. If an attacker can influence the contents of the script referenced by the Executable() engine through writable paths, they may execute controlled commands in the context of the ClickHouse server, leading to privilege escalation and unauthorized code execution. NOTE: the Supplier's position is that these types of executions by low-privileged users are the expected behavior.
Weaknesses CWE-420
References
Metrics cvssV3_1

{'score': 2.8, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N'}


cve-icon MITRE

Status: REJECTED

Assigner: mitre

Published: 2025-06-23T00:00:00.000Z

Updated: 2025-07-03T15:20:56.984Z

Reserved: 2025-06-23T00:00:00.000Z

Link: CVE-2025-52969

cve-icon Vulnrichment

Updated:

cve-icon NVD

Status : Rejected

Published: 2025-06-23T17:15:31.137

Modified: 2025-07-03T16:15:23.710

Link: CVE-2025-52969

cve-icon Redhat

No data.