Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30695: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. in Oracle Corporation MySQL Server

0
Medium
VulnerabilityCVE-2025-30695cvecve-2025-30695
Published: Tue Apr 15 2025 (04/15/2025, 20:31:04 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).

AI-Powered Analysis

AILast updated: 11/03/2025, 21:16:16 UTC

Technical Analysis

CVE-2025-30695 is a vulnerability in Oracle MySQL Server's InnoDB component affecting versions 8.0.0 to 8.0.41, 8.4.0 to 8.4.4, and 9.0.0 to 9.2.0. The flaw allows an attacker with high privileges and network access via multiple protocols to compromise the server. Specifically, the attacker can cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS). Furthermore, the attacker can perform unauthorized data manipulation operations such as update, insert, or delete on some accessible data, thereby compromising data integrity. The vulnerability stems from improper access control (CWE-284) within the InnoDB storage engine, which fails to adequately restrict privileged operations. The CVSS 3.1 base score is 5.5, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and high availability impact (A:H). No known exploits have been reported in the wild, and no official patches have been linked at the time of publication. The vulnerability requires an attacker to already have high privileges, which limits exploitation to insiders or attackers who have escalated privileges. However, the network accessibility via multiple protocols increases the risk surface. This vulnerability can disrupt critical database services and corrupt data, impacting business operations relying on MySQL Server.

Potential Impact

For European organizations, the impact of CVE-2025-30695 can be significant, especially for those relying heavily on MySQL Server for critical applications such as financial services, government databases, healthcare systems, and e-commerce platforms. The ability to cause a denial of service through server hangs or crashes can lead to operational downtime, affecting service availability and potentially causing financial losses and reputational damage. The unauthorized data manipulation capability threatens data integrity, which can result in corrupted records, erroneous transactions, or compliance violations under regulations like GDPR. Since the vulnerability requires high privileges, the risk is higher in environments where privilege management is weak or where insider threats exist. The multi-protocol network access aspect means that attackers could exploit this vulnerability remotely if they have obtained elevated credentials, increasing the attack surface. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released. European organizations with complex MySQL deployments and insufficient monitoring may face challenges detecting exploitation attempts.

Mitigation Recommendations

1. Enforce strict network segmentation and firewall rules to limit MySQL Server access only to trusted hosts and networks, reducing exposure to potential attackers. 2. Implement the principle of least privilege rigorously, ensuring that only necessary users have high-level privileges on MySQL Server. Regularly audit and review user privileges to detect and remove unnecessary elevated access. 3. Monitor MySQL Server logs and network traffic for unusual activities such as repeated connection attempts, unexpected data modification queries, or server crashes that could indicate exploitation attempts. 4. Apply defense-in-depth by using database activity monitoring (DAM) tools and intrusion detection systems (IDS) tailored for database environments. 5. Prepare for patch deployment by tracking Oracle’s security advisories closely and testing patches in staging environments to ensure compatibility and stability. 6. Consider temporary compensating controls such as disabling unused network protocols or services that provide access to MySQL Server until patches are available. 7. Educate database administrators and security teams about this vulnerability and the importance of rapid response to suspicious activities. 8. Use multi-factor authentication (MFA) for administrative access to reduce the risk of credential compromise. 9. Backup critical databases regularly and verify backup integrity to enable recovery in case of data corruption or loss due to exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2025-03-25T20:11:18.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091547c28fd46ded7bb639

Added to database: 11/3/2025, 8:49:11 PM

Last enriched: 11/3/2025, 9:16:16 PM

Last updated: 11/5/2025, 2:12:02 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats