Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30681: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. in Oracle Corporation MySQL Cluster

0
Low
VulnerabilityCVE-2025-30681cvecve-2025-30681
Published: Tue Apr 15 2025 (04/15/2025, 20:30:58 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Cluster

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).

AI-Powered Analysis

AILast updated: 11/03/2025, 21:13:21 UTC

Technical Analysis

CVE-2025-30681 is a vulnerability identified in Oracle Corporation's MySQL Cluster product, specifically within the Server: Replication component. It affects multiple supported versions including 7.6.0, 8.0.0 through 8.0.41, 8.4.0 through 8.4.4, and 9.0.0 through 9.2.0. The vulnerability allows an attacker with high privileges and network access via multiple protocols to exploit a flaw that leads to a partial denial of service (DoS) condition on the MySQL Server. The root cause is related to resource exhaustion (CWE-400), which can degrade the availability of the MySQL Cluster service. The CVSS 3.1 base score is 2.7, reflecting a low severity primarily due to the requirement for high privileges (PR:H), no user interaction (UI:N), and the impact being limited to availability (A:L) without affecting confidentiality or integrity. The attack surface includes network access to the MySQL Cluster nodes, and the vulnerability can be triggered remotely. No known exploits have been reported in the wild at the time of publication. The vulnerability is significant in environments where MySQL Cluster is used for critical database replication and high availability, as partial DoS could disrupt service continuity and impact dependent applications.

Potential Impact

For European organizations, the primary impact of CVE-2025-30681 is the potential for partial denial of service on MySQL Cluster deployments. This could lead to degraded database performance or temporary unavailability of services relying on MySQL Cluster, affecting business operations, especially in sectors such as finance, telecommunications, and e-commerce where database availability is critical. Although the vulnerability does not compromise data confidentiality or integrity, service disruptions can cause operational delays, customer dissatisfaction, and potential financial losses. Organizations with high-availability requirements or those using MySQL Cluster for replication and failover may experience interruptions in their disaster recovery capabilities. The requirement for high privileges limits the risk to insiders or attackers who have already compromised administrative credentials, but it underscores the importance of strict access controls. Given the widespread use of MySQL in Europe, the impact could be notable in enterprises and public sector entities that depend on Oracle MySQL Cluster for their backend infrastructure.

Mitigation Recommendations

1. Apply official patches from Oracle as soon as they become available to address CVE-2025-30681. 2. Restrict network access to MySQL Cluster nodes by implementing strict firewall rules and network segmentation to limit exposure only to trusted hosts and management systems. 3. Enforce the principle of least privilege by ensuring that only authorized administrators have high-level access to MySQL Cluster components. 4. Monitor MySQL Cluster resource usage and replication performance metrics to detect unusual spikes or degradation that could indicate exploitation attempts. 5. Implement robust authentication and authorization controls, including multi-factor authentication for administrative access. 6. Regularly audit and review user privileges and network configurations to reduce the attack surface. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) that can identify anomalous traffic patterns targeting MySQL Cluster protocols. 8. Maintain up-to-date backups and disaster recovery plans to minimize operational impact in case of service disruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2025-03-25T20:11:18.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091545c28fd46ded7bb603

Added to database: 11/3/2025, 8:49:09 PM

Last enriched: 11/3/2025, 9:13:21 PM

Last updated: 11/5/2025, 3:58:27 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats