Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21546: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. in Oracle Corporation MySQL Server

0
Low
VulnerabilityCVE-2025-21546cvecve-2025-21546
Published: Tue Jan 21 2025 (01/21/2025, 20:53:14 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 11/04/2025, 01:15:36 UTC

Technical Analysis

CVE-2025-21546 is a security vulnerability identified in Oracle MySQL Server affecting multiple versions including 8.0.40 and prior, 8.4.3 and prior, and 9.1.0 and prior. The vulnerability stems from improper privilege enforcement within the MySQL Server's security and privileges component, classified under CWE-863 (Incorrect Authorization). A high-privileged attacker with network access via multiple supported protocols can exploit this flaw to perform unauthorized operations such as update, insert, or delete on some accessible MySQL data, as well as unauthorized read access to a subset of data. The attack does not require user interaction and does not impact availability, but it compromises confidentiality and integrity to a limited extent. The CVSS 3.1 base score is 3.8, reflecting a low severity primarily due to the prerequisite of high privileges and the limited scope of data exposure and modification. No public exploits have been reported yet, but the vulnerability is easily exploitable given network access and high privileges. The vulnerability affects a broad range of MySQL versions, indicating a long-standing issue in privilege management. This flaw could be leveraged by insiders or attackers who have already compromised high-level credentials or systems within the network to escalate their capabilities and manipulate or exfiltrate data from MySQL databases. The lack of availability impact means service disruption is unlikely, but data integrity and confidentiality risks remain significant in sensitive environments. Oracle has published the vulnerability details but no patch links are currently provided, suggesting that remediation may be pending or in progress.

Potential Impact

For European organizations, the impact of CVE-2025-21546 depends largely on the presence of high-privileged attackers with network access to MySQL servers. Organizations using affected MySQL versions in critical applications or handling sensitive data could face unauthorized data manipulation or disclosure, undermining data integrity and confidentiality. This could lead to compliance violations under GDPR if personal data is involved, reputational damage, and potential financial losses. The vulnerability does not affect availability, so service continuity is less likely to be impacted. However, attackers exploiting this flaw could alter or exfiltrate data, potentially affecting business operations, decision-making, and trustworthiness of data. Industries such as finance, healthcare, government, and telecommunications that rely heavily on MySQL databases for critical data storage are at higher risk. The requirement for high privileges limits exploitation to insiders or attackers who have already breached perimeter defenses, emphasizing the importance of internal security controls. European organizations with remote or cloud-hosted MySQL deployments accessible over the network are particularly vulnerable if proper network segmentation and access controls are not enforced.

Mitigation Recommendations

1. Monitor Oracle's official channels for patches addressing CVE-2025-21546 and apply them promptly once available. 2. Restrict network access to MySQL servers using firewalls and network segmentation to limit exposure only to trusted hosts and services. 3. Enforce the principle of least privilege rigorously by auditing and minimizing high-privileged MySQL accounts and credentials. 4. Implement strong authentication mechanisms and consider multi-factor authentication for administrative access to MySQL servers. 5. Regularly review and audit MySQL user privileges and access logs to detect unauthorized or suspicious activities early. 6. Employ network intrusion detection and prevention systems to monitor for anomalous access patterns targeting MySQL services. 7. Use encrypted connections (e.g., TLS) for MySQL network traffic to prevent interception or tampering. 8. Consider deploying database activity monitoring tools that can alert on unauthorized data modification or access attempts. 9. Educate internal teams about the risks of privilege escalation and the importance of safeguarding administrative credentials. 10. For cloud or managed database services, verify that providers have applied relevant patches and security configurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2024-12-24T23:18:54.774Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091a4dc28fd46ded81d113

Added to database: 11/3/2025, 9:10:37 PM

Last enriched: 11/4/2025, 1:15:36 AM

Last updated: 11/5/2025, 1:51:53 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats