Skip to main content

CVE-2025-50078: Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server

Medium
VulnerabilityCVE-2025-50078cvecve-2025-50078
Published: Tue Jul 15 2025 (07/15/2025, 19:27:40 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 07/23/2025, 01:44:21 UTC

Technical Analysis

CVE-2025-50078 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically affecting versions 8.0.0 through 8.0.42, 8.4.0 through 8.4.5, and 9.0.0 through 9.3.0. The vulnerability resides in the Server: DML component and allows a low-privileged attacker with network access via multiple protocols to exploit the system. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and only low privileges (PR:L) without any user interaction (UI:N). The scope is unchanged (S:U), and the impact is solely on availability (A:H), with no impact on confidentiality or integrity. Successful exploitation results in the ability to cause the MySQL Server to hang or crash repeatedly, effectively causing a denial of service (DoS). This vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption leading to DoS conditions. The CVSS 3.1 base score is 6.5, indicating a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is easily exploitable due to low complexity and network accessibility, making it a significant concern for environments relying on MySQL Server for critical database operations. The lack of confidentiality or integrity impact limits the threat to availability disruption, but given MySQL's widespread use, the potential for service outages is considerable.

Potential Impact

For European organizations, the impact of CVE-2025-50078 can be substantial, particularly for those relying on MySQL Server for critical business applications, e-commerce platforms, financial services, healthcare systems, and public sector databases. A successful DoS attack could lead to prolonged service outages, disrupting business continuity, causing financial losses, and damaging reputation. In sectors with strict regulatory requirements such as GDPR, service unavailability could also lead to compliance issues if data processing or availability obligations are not met. The vulnerability's ease of exploitation means attackers could launch DoS attacks remotely without needing elevated privileges or user interaction, increasing the risk of widespread disruption. Organizations with multi-tenant environments or cloud-hosted MySQL instances may face cascading effects impacting multiple customers or services. Additionally, the repeated crashes could complicate recovery efforts and increase operational costs due to incident response and mitigation activities.

Mitigation Recommendations

To mitigate CVE-2025-50078 effectively, European organizations should: 1) Prioritize upgrading MySQL Server to patched versions as soon as Oracle releases them, monitoring Oracle's advisories closely. 2) Implement network-level controls to restrict access to MySQL Server ports (default 3306) to trusted hosts and networks only, using firewalls and network segmentation to minimize exposure. 3) Employ intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous traffic patterns indicative of DoS attempts targeting MySQL. 4) Enforce strict access controls and monitor for unusual low-privilege network activity that could indicate exploitation attempts. 5) Utilize connection throttling and query rate limiting where supported to reduce the risk of resource exhaustion. 6) Maintain robust backup and recovery procedures to minimize downtime in case of service disruption. 7) Conduct regular vulnerability assessments and penetration testing focusing on database services to identify potential exploitation paths. 8) Consider deploying MySQL in high-availability configurations with failover capabilities to reduce single points of failure. These measures go beyond generic advice by focusing on network access restrictions, proactive monitoring, and architectural resilience tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-11T22:56:56.111Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b00aa83201eaacd04456

Added to database: 7/15/2025, 7:46:18 PM

Last enriched: 7/23/2025, 1:44:21 AM

Last updated: 8/16/2025, 1:11:33 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats