Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30722: Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Cluster accessible data. in Oracle Corporation MySQL Cluster

0
Medium
VulnerabilityCVE-2025-30722cvecve-2025-30722
Published: Tue Apr 15 2025 (04/15/2025, 20:31:15 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Cluster

Description

Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Client accessible data as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N).

AI-Powered Analysis

AILast updated: 11/03/2025, 21:18:41 UTC

Technical Analysis

CVE-2025-30722 is a vulnerability identified in the MySQL Client component of Oracle's MySQL Cluster product, specifically impacting the mysqldump utility. The affected versions span multiple major releases: 8.0.0 through 8.0.41, 8.4.0 through 8.4.4, and 9.0.0 through 9.2.0. The vulnerability allows a low privileged attacker who has network access via multiple protocols to exploit the flaw, although the attack complexity is high, meaning it is difficult to exploit. No user interaction is required, and the attacker does not need elevated privileges beyond low-level network access. Successful exploitation can lead to unauthorized access to critical data within the MySQL Cluster environment, including the ability to read sensitive information and perform unauthorized data modifications such as updates, inserts, or deletes on some accessible data sets. The CVSS 3.1 base score is 5.3, reflecting medium severity, with confidentiality and integrity impacts but no impact on availability. The vulnerability does not require authentication and affects the client-side component, which may be exposed in networked environments where MySQL Cluster clients communicate with servers. No known exploits have been reported in the wild as of the publication date, but the potential for data compromise and unauthorized data manipulation poses a significant risk to organizations relying on these MySQL Cluster versions. The vulnerability's presence across multiple versions and the critical nature of the data handled by MySQL Cluster make it a concern for database administrators and security teams.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized data disclosure and unauthorized data modification within MySQL Cluster environments. Organizations that rely on MySQL Cluster for critical applications, including financial services, healthcare, telecommunications, and government infrastructure, may face confidentiality breaches exposing sensitive personal or corporate data. Integrity impacts could lead to data corruption or manipulation, potentially disrupting business operations or causing compliance violations under regulations such as GDPR. Although exploitation is difficult, the broad network access vector and lack of required user interaction increase the attack surface, especially in complex networked environments. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time. The impact is heightened in sectors where MySQL Cluster is used for high-availability and distributed database solutions, common in large enterprises and service providers across Europe.

Mitigation Recommendations

1. Apply official patches or updates from Oracle as soon as they become available for the affected MySQL Cluster versions. 2. Restrict network access to MySQL Cluster clients by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts and networks only. 3. Use encrypted connections (e.g., TLS) for MySQL Cluster communications to reduce the risk of interception or man-in-the-middle attacks. 4. Monitor database logs and network traffic for unusual access patterns or unauthorized data modification attempts, employing anomaly detection tools where possible. 5. Implement least privilege principles for database users and service accounts interacting with MySQL Cluster to minimize potential damage from compromised clients. 6. Regularly audit MySQL Cluster configurations and client deployments to ensure they do not expose unnecessary network services or protocols. 7. Educate database administrators and security teams about this vulnerability and encourage proactive incident response planning. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting MySQL Cluster protocols.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2025-03-25T20:11:18.271Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091549c28fd46ded7bb749

Added to database: 11/3/2025, 8:49:13 PM

Last enriched: 11/3/2025, 9:18:41 PM

Last updated: 11/5/2025, 10:34:31 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats