CVE-2025-50076: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.25. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2025-50076 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically affecting versions from 8.0.0 through 8.0.25. The vulnerability resides in the Server component responsible for Data Manipulation Language (DML) operations. It allows a low-privileged attacker with network access to exploit the flaw via multiple protocols without requiring user interaction. The attacker must have some level of privileges (PR:L) but does not need to be fully authenticated as an administrator. The vulnerability enables the attacker to cause a denial-of-service (DoS) condition by triggering a hang or a frequently repeatable crash of the MySQL Server, impacting availability but not confidentiality or integrity. The CVSS 3.1 base score is 6.5, indicating a medium severity primarily due to its impact on availability (A:H) and ease of exploitation (AC:L). The underlying weakness is categorized under CWE-400, which relates to uncontrolled resource consumption leading to DoS. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's network vector (AV:N) means it can be exploited remotely, increasing its risk profile. Given MySQL's widespread use in enterprise environments, this vulnerability poses a significant risk to database availability, potentially disrupting business operations reliant on MySQL databases.
Potential Impact
For European organizations, this vulnerability could lead to significant operational disruptions, especially for those relying heavily on MySQL Server for critical applications, websites, and services. A successful DoS attack could cause downtime, affecting service availability to customers and internal users, leading to potential financial losses and reputational damage. Sectors such as finance, e-commerce, healthcare, and public services, which often depend on high availability and data accessibility, could be particularly impacted. Additionally, the requirement of low privileges and network access means that insider threats or compromised low-level accounts could be leveraged to exploit this vulnerability. The absence of confidentiality or integrity impact reduces risks related to data breaches but does not diminish the importance of maintaining service continuity. Given the medium severity, organizations should prioritize mitigation to prevent service interruptions, especially in environments where MySQL is exposed to untrusted networks or where multiple protocols are enabled, increasing the attack surface.
Mitigation Recommendations
Organizations should immediately audit their MySQL Server deployments to identify affected versions (8.0.0 to 8.0.25). Until an official patch is released, the following specific mitigations are recommended: 1) Restrict network access to MySQL servers by implementing strict firewall rules and network segmentation to limit exposure only to trusted hosts and services. 2) Disable or limit the use of unnecessary protocols that provide network access to MySQL to reduce the attack surface. 3) Enforce the principle of least privilege rigorously, ensuring that user accounts have only the minimal required permissions, reducing the risk of exploitation by low-privileged attackers. 4) Monitor MySQL server logs and network traffic for unusual activity or repeated connection attempts that could indicate exploitation attempts. 5) Implement resource limits and connection throttling on MySQL to mitigate the impact of resource exhaustion attacks. 6) Prepare incident response plans to quickly recover from potential DoS conditions, including automated service restarts and failover mechanisms. 7) Stay updated with Oracle's security advisories for the release of patches and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Ireland
CVE-2025-50076: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.25. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2025-50076 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically affecting versions from 8.0.0 through 8.0.25. The vulnerability resides in the Server component responsible for Data Manipulation Language (DML) operations. It allows a low-privileged attacker with network access to exploit the flaw via multiple protocols without requiring user interaction. The attacker must have some level of privileges (PR:L) but does not need to be fully authenticated as an administrator. The vulnerability enables the attacker to cause a denial-of-service (DoS) condition by triggering a hang or a frequently repeatable crash of the MySQL Server, impacting availability but not confidentiality or integrity. The CVSS 3.1 base score is 6.5, indicating a medium severity primarily due to its impact on availability (A:H) and ease of exploitation (AC:L). The underlying weakness is categorized under CWE-400, which relates to uncontrolled resource consumption leading to DoS. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's network vector (AV:N) means it can be exploited remotely, increasing its risk profile. Given MySQL's widespread use in enterprise environments, this vulnerability poses a significant risk to database availability, potentially disrupting business operations reliant on MySQL databases.
Potential Impact
For European organizations, this vulnerability could lead to significant operational disruptions, especially for those relying heavily on MySQL Server for critical applications, websites, and services. A successful DoS attack could cause downtime, affecting service availability to customers and internal users, leading to potential financial losses and reputational damage. Sectors such as finance, e-commerce, healthcare, and public services, which often depend on high availability and data accessibility, could be particularly impacted. Additionally, the requirement of low privileges and network access means that insider threats or compromised low-level accounts could be leveraged to exploit this vulnerability. The absence of confidentiality or integrity impact reduces risks related to data breaches but does not diminish the importance of maintaining service continuity. Given the medium severity, organizations should prioritize mitigation to prevent service interruptions, especially in environments where MySQL is exposed to untrusted networks or where multiple protocols are enabled, increasing the attack surface.
Mitigation Recommendations
Organizations should immediately audit their MySQL Server deployments to identify affected versions (8.0.0 to 8.0.25). Until an official patch is released, the following specific mitigations are recommended: 1) Restrict network access to MySQL servers by implementing strict firewall rules and network segmentation to limit exposure only to trusted hosts and services. 2) Disable or limit the use of unnecessary protocols that provide network access to MySQL to reduce the attack surface. 3) Enforce the principle of least privilege rigorously, ensuring that user accounts have only the minimal required permissions, reducing the risk of exploitation by low-privileged attackers. 4) Monitor MySQL server logs and network traffic for unusual activity or repeated connection attempts that could indicate exploitation attempts. 5) Implement resource limits and connection throttling on MySQL to mitigate the impact of resource exhaustion attacks. 6) Prepare incident response plans to quickly recover from potential DoS conditions, including automated service restarts and failover mechanisms. 7) Stay updated with Oracle's security advisories for the release of patches and apply them promptly once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-06-11T22:56:56.111Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b00aa83201eaacd04450
Added to database: 7/15/2025, 7:46:18 PM
Last enriched: 7/23/2025, 1:43:51 AM
Last updated: 8/20/2025, 7:46:42 AM
Views: 34
Related Threats
CVE-2025-8193
LowCVE-2025-9356: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9355: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-24902: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.