Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21520: Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data. in Oracle Corporation MySQL Cluster

0
Low
VulnerabilityCVE-2025-21520cvecve-2025-21520
Published: Tue Jan 21 2025 (01/21/2025, 20:53:04 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Cluster

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 1.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N).

AI-Powered Analysis

AILast updated: 11/04/2025, 01:12:34 UTC

Technical Analysis

CVE-2025-21520 is a vulnerability identified in Oracle's MySQL Cluster product, specifically within the MySQL Server component related to server options. The affected versions include 8.0.40 and earlier, 8.4.3 and earlier, and 9.1.0 and earlier. The vulnerability allows an attacker who already has high-level privileges and login access to the infrastructure hosting the MySQL Cluster to potentially compromise the server. However, exploitation is notably difficult because it requires human interaction from a user other than the attacker, such as tricking a legitimate user into performing an action. The impact of a successful attack is limited to unauthorized read access to a subset of data accessible by the MySQL Cluster, without affecting data integrity or availability. The CVSS 3.1 base score of 1.8 reflects these constraints, with attack vector local (AV:L), high attack complexity (AC:H), required privileges high (PR:H), required user interaction (UI:R), unchanged scope (S:U), and low confidentiality impact (C:L). This vulnerability is categorized under CWE-732, which relates to permissions issues. No patches or known exploits have been reported at the time of publication, and the vulnerability was reserved in late 2024 and published in early 2025.

Potential Impact

For European organizations, the impact of CVE-2025-21520 is limited due to the low severity and the complex conditions required for exploitation. Organizations that deploy Oracle MySQL Cluster in critical infrastructure or data-sensitive environments could face unauthorized disclosure of some data subsets if an attacker with high privileges and access to the infrastructure successfully exploits the vulnerability. However, since exploitation requires human interaction from a third party and high privileges, the risk of widespread or automated attacks is low. Confidentiality could be marginally compromised, but integrity and availability remain unaffected. Organizations with strict data privacy regulations, such as GDPR, should still consider the potential for data leakage, especially if sensitive personal or business-critical data is stored in MySQL Cluster. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict and monitor high-privilege access to MySQL Cluster infrastructure, ensuring only authorized personnel have such access. 2) Enforce strict access controls and multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 3) Conduct user awareness training to minimize the risk of social engineering or inadvertent user interaction that could facilitate exploitation. 4) Regularly audit MySQL Cluster configurations and permissions to detect and remediate any excessive privileges or misconfigurations. 5) Apply Oracle's security updates promptly once patches become available, even though none are currently released. 6) Implement network segmentation to isolate MySQL Cluster infrastructure from less trusted network zones. 7) Monitor logs and alerts for unusual access patterns or attempts to exploit the vulnerability. These steps go beyond generic advice by focusing on the specific conditions required for exploitation and the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2024-12-24T23:18:54.766Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091a4cc28fd46ded81d0dd

Added to database: 11/3/2025, 9:10:36 PM

Last enriched: 11/4/2025, 1:12:34 AM

Last updated: 12/20/2025, 7:19:20 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats