CVE-2025-30687: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2025-30687 is a vulnerability identified in Oracle MySQL Server's Optimizer component affecting multiple supported versions: 8.0.0 through 8.0.41, 8.4.0 through 8.4.4, and 9.0.0 through 9.2.0. The flaw allows an attacker with low privileges and network access via multiple protocols to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS). The CVSS 3.1 base score is 6.5, reflecting a medium severity primarily due to the impact on availability (A:H) while confidentiality and integrity remain unaffected. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and low privileges (PR:L), with no user interaction (UI:N) needed. The vulnerability is classified under CWE-732, which relates to incorrect permission assignment or management, indicating that the issue likely stems from improper handling of privileges or access controls within the optimizer component. Although no exploits have been observed in the wild, the vulnerability is easily exploitable given the low privilege and network access requirements. The absence of patch links suggests that Oracle has not yet released a fix, emphasizing the need for interim mitigations. The vulnerability could be triggered remotely, potentially affecting any MySQL Server instance exposed to untrusted networks or insufficiently protected internal networks. This could disrupt database availability, impacting applications and services dependent on MySQL, especially in environments where high availability is critical.
Potential Impact
For European organizations, the primary impact of CVE-2025-30687 is on the availability of MySQL Server instances, which could lead to significant service disruptions. Many enterprises, government agencies, and service providers across Europe rely on MySQL for critical data storage and application backends. A successful denial of service attack could halt business operations, degrade customer experience, and cause financial losses. Sectors such as finance, healthcare, telecommunications, and public administration are particularly vulnerable due to their reliance on continuous database availability. Additionally, organizations with MySQL servers exposed to the internet or accessible across less secure internal networks face higher risk. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not diminish the operational consequences of downtime. Furthermore, repeated crashes could increase recovery time and operational costs. The medium severity rating suggests a moderate but tangible threat level that requires attention to maintain service continuity and compliance with European data protection and operational standards.
Mitigation Recommendations
1. Immediately audit all MySQL Server instances to identify affected versions (8.0.0-8.0.41, 8.4.0-8.4.4, 9.0.0-9.2.0) and isolate those exposed to untrusted networks. 2. Implement strict network segmentation and firewall rules to restrict access to MySQL servers only to trusted hosts and services. 3. Enforce the principle of least privilege by reviewing and tightening MySQL user permissions, ensuring that low privileged accounts cannot exploit this vulnerability. 4. Monitor MySQL server logs and network traffic for unusual patterns indicative of attempted exploitation, such as repeated connection attempts or server hangs. 5. Prepare for rapid deployment of patches or updates once Oracle releases a fix; subscribe to Oracle security advisories for timely notifications. 6. Consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block exploit attempts targeting this vulnerability. 7. Develop and test incident response plans to quickly recover MySQL services in case of denial of service attacks. 8. Where feasible, implement redundancy and failover mechanisms to minimize downtime impact. 9. Educate database administrators and security teams about this vulnerability and recommended defensive measures.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-30687: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2025-30687 is a vulnerability identified in Oracle MySQL Server's Optimizer component affecting multiple supported versions: 8.0.0 through 8.0.41, 8.4.0 through 8.4.4, and 9.0.0 through 9.2.0. The flaw allows an attacker with low privileges and network access via multiple protocols to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS). The CVSS 3.1 base score is 6.5, reflecting a medium severity primarily due to the impact on availability (A:H) while confidentiality and integrity remain unaffected. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and low privileges (PR:L), with no user interaction (UI:N) needed. The vulnerability is classified under CWE-732, which relates to incorrect permission assignment or management, indicating that the issue likely stems from improper handling of privileges or access controls within the optimizer component. Although no exploits have been observed in the wild, the vulnerability is easily exploitable given the low privilege and network access requirements. The absence of patch links suggests that Oracle has not yet released a fix, emphasizing the need for interim mitigations. The vulnerability could be triggered remotely, potentially affecting any MySQL Server instance exposed to untrusted networks or insufficiently protected internal networks. This could disrupt database availability, impacting applications and services dependent on MySQL, especially in environments where high availability is critical.
Potential Impact
For European organizations, the primary impact of CVE-2025-30687 is on the availability of MySQL Server instances, which could lead to significant service disruptions. Many enterprises, government agencies, and service providers across Europe rely on MySQL for critical data storage and application backends. A successful denial of service attack could halt business operations, degrade customer experience, and cause financial losses. Sectors such as finance, healthcare, telecommunications, and public administration are particularly vulnerable due to their reliance on continuous database availability. Additionally, organizations with MySQL servers exposed to the internet or accessible across less secure internal networks face higher risk. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not diminish the operational consequences of downtime. Furthermore, repeated crashes could increase recovery time and operational costs. The medium severity rating suggests a moderate but tangible threat level that requires attention to maintain service continuity and compliance with European data protection and operational standards.
Mitigation Recommendations
1. Immediately audit all MySQL Server instances to identify affected versions (8.0.0-8.0.41, 8.4.0-8.4.4, 9.0.0-9.2.0) and isolate those exposed to untrusted networks. 2. Implement strict network segmentation and firewall rules to restrict access to MySQL servers only to trusted hosts and services. 3. Enforce the principle of least privilege by reviewing and tightening MySQL user permissions, ensuring that low privileged accounts cannot exploit this vulnerability. 4. Monitor MySQL server logs and network traffic for unusual patterns indicative of attempted exploitation, such as repeated connection attempts or server hangs. 5. Prepare for rapid deployment of patches or updates once Oracle releases a fix; subscribe to Oracle security advisories for timely notifications. 6. Consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block exploit attempts targeting this vulnerability. 7. Develop and test incident response plans to quickly recover MySQL services in case of denial of service attacks. 8. Where feasible, implement redundancy and failover mechanisms to minimize downtime impact. 9. Educate database administrators and security teams about this vulnerability and recommended defensive measures.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2025-03-25T20:11:18.262Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69091547c28fd46ded7bb623
Added to database: 11/3/2025, 8:49:11 PM
Last enriched: 11/3/2025, 9:14:52 PM
Last updated: 12/20/2025, 5:11:10 PM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.