CVE-2025-21520: Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data. in Oracle Corporation MySQL Cluster
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 1.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N).
AI Analysis
Technical Summary
CVE-2025-21520 is a vulnerability identified in Oracle's MySQL Cluster product, specifically within the MySQL Server component related to server options. The affected versions include 8.0.40 and earlier, 8.4.3 and earlier, and 9.1.0 and earlier. The vulnerability allows an attacker who already has high-level privileges and login access to the infrastructure hosting the MySQL Cluster to potentially compromise the server. However, exploitation is notably difficult because it requires human interaction from a user other than the attacker, such as tricking a legitimate user into performing an action. The impact of a successful attack is limited to unauthorized read access to a subset of data accessible by the MySQL Cluster, without affecting data integrity or availability. The CVSS 3.1 base score of 1.8 reflects these constraints, with attack vector local (AV:L), high attack complexity (AC:H), required privileges high (PR:H), required user interaction (UI:R), unchanged scope (S:U), and low confidentiality impact (C:L). This vulnerability is categorized under CWE-732, which relates to permissions issues. No patches or known exploits have been reported at the time of publication, and the vulnerability was reserved in late 2024 and published in early 2025.
Potential Impact
For European organizations, the impact of CVE-2025-21520 is limited due to the low severity and the complex conditions required for exploitation. Organizations that deploy Oracle MySQL Cluster in critical infrastructure or data-sensitive environments could face unauthorized disclosure of some data subsets if an attacker with high privileges and access to the infrastructure successfully exploits the vulnerability. However, since exploitation requires human interaction from a third party and high privileges, the risk of widespread or automated attacks is low. Confidentiality could be marginally compromised, but integrity and availability remain unaffected. Organizations with strict data privacy regulations, such as GDPR, should still consider the potential for data leakage, especially if sensitive personal or business-critical data is stored in MySQL Cluster. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict and monitor high-privilege access to MySQL Cluster infrastructure, ensuring only authorized personnel have such access. 2) Enforce strict access controls and multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 3) Conduct user awareness training to minimize the risk of social engineering or inadvertent user interaction that could facilitate exploitation. 4) Regularly audit MySQL Cluster configurations and permissions to detect and remediate any excessive privileges or misconfigurations. 5) Apply Oracle's security updates promptly once patches become available, even though none are currently released. 6) Implement network segmentation to isolate MySQL Cluster infrastructure from less trusted network zones. 7) Monitor logs and alerts for unusual access patterns or attempts to exploit the vulnerability. These steps go beyond generic advice by focusing on the specific conditions required for exploitation and the nature of the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-21520: Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data. in Oracle Corporation MySQL Cluster
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 1.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2025-21520 is a vulnerability identified in Oracle's MySQL Cluster product, specifically within the MySQL Server component related to server options. The affected versions include 8.0.40 and earlier, 8.4.3 and earlier, and 9.1.0 and earlier. The vulnerability allows an attacker who already has high-level privileges and login access to the infrastructure hosting the MySQL Cluster to potentially compromise the server. However, exploitation is notably difficult because it requires human interaction from a user other than the attacker, such as tricking a legitimate user into performing an action. The impact of a successful attack is limited to unauthorized read access to a subset of data accessible by the MySQL Cluster, without affecting data integrity or availability. The CVSS 3.1 base score of 1.8 reflects these constraints, with attack vector local (AV:L), high attack complexity (AC:H), required privileges high (PR:H), required user interaction (UI:R), unchanged scope (S:U), and low confidentiality impact (C:L). This vulnerability is categorized under CWE-732, which relates to permissions issues. No patches or known exploits have been reported at the time of publication, and the vulnerability was reserved in late 2024 and published in early 2025.
Potential Impact
For European organizations, the impact of CVE-2025-21520 is limited due to the low severity and the complex conditions required for exploitation. Organizations that deploy Oracle MySQL Cluster in critical infrastructure or data-sensitive environments could face unauthorized disclosure of some data subsets if an attacker with high privileges and access to the infrastructure successfully exploits the vulnerability. However, since exploitation requires human interaction from a third party and high privileges, the risk of widespread or automated attacks is low. Confidentiality could be marginally compromised, but integrity and availability remain unaffected. Organizations with strict data privacy regulations, such as GDPR, should still consider the potential for data leakage, especially if sensitive personal or business-critical data is stored in MySQL Cluster. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict and monitor high-privilege access to MySQL Cluster infrastructure, ensuring only authorized personnel have such access. 2) Enforce strict access controls and multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 3) Conduct user awareness training to minimize the risk of social engineering or inadvertent user interaction that could facilitate exploitation. 4) Regularly audit MySQL Cluster configurations and permissions to detect and remediate any excessive privileges or misconfigurations. 5) Apply Oracle's security updates promptly once patches become available, even though none are currently released. 6) Implement network segmentation to isolate MySQL Cluster infrastructure from less trusted network zones. 7) Monitor logs and alerts for unusual access patterns or attempts to exploit the vulnerability. These steps go beyond generic advice by focusing on the specific conditions required for exploitation and the nature of the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2024-12-24T23:18:54.766Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69091a4cc28fd46ded81d0dd
Added to database: 11/3/2025, 9:10:36 PM
Last enriched: 11/4/2025, 1:12:34 AM
Last updated: 12/20/2025, 7:19:20 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12820: CWE-862 Missing Authorization in Pure WC Variation Swatches
UnknownCVE-2025-14735: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in nestornoe Amazon affiliate lite Plugin
MediumCVE-2025-14734: CWE-352 Cross-Site Request Forgery (CSRF) in nestornoe Amazon affiliate lite Plugin
MediumCVE-2025-14721: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mansoormunib RESPONSIVE AND SWIPE SLIDER!
MediumCVE-2025-14633: CWE-862 Missing Authorization in niao70 F70 Lead Document Download
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.