Unprotected Alternate Channel Affecting clickhouse/clickhouse package, versions [0,]


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-CLICKHOUSECLICKHOUSE-10872130
  • published21 Jul 2025
  • disclosed23 Jun 2025
  • creditSeth Kraft

Introduced: 23 Jun 2025

CVE-2025-52969  (opens in a new tab)
CWE-420  (opens in a new tab)

How to fix?

There is no fixed version for clickhouse/clickhouse.

Overview

Affected versions of this package are vulnerable to Unprotected Alternate Channel in the Executable process. An attacker can gain unauthorized code execution by querying existing Executable tables created by higher-privileged users and influencing the contents of the script referenced by the Executable() engine through writable paths.

References

CVSS Base Scores

version 4.0
version 3.1