{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T00:17:49.142","vulnerabilities":[{"cve":{"id":"CVE-2025-1385","sourceIdentifier":"cb7ba516-3b07-4c98-b0c2-715220f1a8f6","published":"2025-03-20T08:15:11.723","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"When the library bridge feature is enabled, the clickhouse-library-bridge exposes an HTTP API on localhost. This allows clickhouse-server to dynamically load a library from a specified path and execute it in an isolated process. Combined with the ClickHouse table engine functionality that permits file uploads to specific directories, a misconfigured server can be exploited by an attacker with privilege to access to both table engines to execute arbitrary code on the ClickHouse server.\n\nYou can check if your ClickHouse server is vulnerable to this vulnerability by inspecting the configuration file and confirming if the following setting is enabled:\n\n<library_bridge>\n   <port>9019</port>\n</library_bridge>"},{"lang":"es","value":"Cuando la función de puente de librería está habilitada, clickhouse-library-bridge expone una API HTTP en el host local. Esto permite a clickhouse-server cargar dinámicamente una librería desde una ruta específica y ejecutarla en un proceso aislado. En combinación con la funcionalidad del motor de tablas de ClickHouse, que permite la carga de archivos a directorios específicos, un servidor mal configurado puede ser explotado por un atacante con privilegios de acceso a ambos motores de tablas para ejecutar código arbitrario en el servidor de ClickHouse. Puede comprobar si su servidor de ClickHouse es vulnerable a esta vulnerabilidad inspeccionando el archivo de configuración y confirmando si la siguiente configuración está habilitada:  9019 "}],"metrics":{"cvssMetricV40":[{"source":"cb7ba516-3b07-4c98-b0c2-715220f1a8f6","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"weaknesses":[{"source":"cb7ba516-3b07-4c98-b0c2-715220f1a8f6","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"references":[{"url":"https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-5phv-x8x4-83x5","source":"cb7ba516-3b07-4c98-b0c2-715220f1a8f6"}]}}]}