CVE-2025-50080: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2025-50080 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically affecting the Stored Procedure component across multiple supported versions: 8.0.0 through 8.0.42, 8.4.0 through 8.4.5, and 9.0.0 through 9.3.0. This vulnerability allows a high-privileged attacker with network access to exploit the server via multiple protocols. The vulnerability does not impact confidentiality or integrity but affects availability by enabling an attacker to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS). The CVSS 3.1 base score is 4.9, categorized as medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), and high availability impact (A:H). The underlying weakness corresponds to CWE-400, which relates to uncontrolled resource consumption leading to DoS conditions. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability is easily exploitable by an attacker who already has high privileges and network access, emphasizing the importance of controlling privileged access and network exposure. The attack can be executed through multiple protocols, increasing the attack surface. This vulnerability primarily threatens the availability of MySQL Server instances, potentially disrupting database services and dependent applications.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of critical database services running MySQL Server versions affected. Organizations relying on MySQL for transactional systems, web applications, or internal data processing could experience service outages or degraded performance due to server hangs or crashes induced by an attacker. This could lead to operational disruptions, loss of productivity, and potential financial losses. While the vulnerability does not compromise data confidentiality or integrity, the denial of service could indirectly impact business continuity and customer trust. Sectors such as finance, healthcare, e-commerce, and public services, which often rely on MySQL databases, may be particularly vulnerable. Given the requirement for high privileges, insider threats or compromised administrative accounts pose a higher risk. Additionally, the ability to exploit via multiple protocols increases the likelihood of attack vectors, especially in complex network environments. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Immediately audit and restrict high-privileged MySQL user accounts, ensuring the principle of least privilege is enforced and unnecessary administrative accounts are disabled or removed. 2) Harden network access controls by limiting MySQL Server exposure to trusted networks only, using firewalls and network segmentation to restrict protocol access to essential services and known IP addresses. 3) Monitor MySQL server logs and network traffic for unusual activity indicative of exploitation attempts, such as repeated connection attempts or abnormal stored procedure executions. 4) Implement robust authentication and access controls, including multi-factor authentication for administrative access to MySQL servers. 5) Prepare for patch deployment by closely monitoring Oracle's security advisories for the release of a fix and plan timely patch application to affected MySQL versions. 6) Consider deploying database activity monitoring (DAM) solutions to detect and alert on anomalous behaviors related to stored procedures or resource consumption. 7) Develop and test incident response plans to quickly recover from potential DoS attacks, including database failover and backup restoration procedures. These targeted actions go beyond generic advice by focusing on privilege management, network restrictions, and proactive monitoring tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-50080: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2025-50080 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically affecting the Stored Procedure component across multiple supported versions: 8.0.0 through 8.0.42, 8.4.0 through 8.4.5, and 9.0.0 through 9.3.0. This vulnerability allows a high-privileged attacker with network access to exploit the server via multiple protocols. The vulnerability does not impact confidentiality or integrity but affects availability by enabling an attacker to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS). The CVSS 3.1 base score is 4.9, categorized as medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), and high availability impact (A:H). The underlying weakness corresponds to CWE-400, which relates to uncontrolled resource consumption leading to DoS conditions. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability is easily exploitable by an attacker who already has high privileges and network access, emphasizing the importance of controlling privileged access and network exposure. The attack can be executed through multiple protocols, increasing the attack surface. This vulnerability primarily threatens the availability of MySQL Server instances, potentially disrupting database services and dependent applications.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of critical database services running MySQL Server versions affected. Organizations relying on MySQL for transactional systems, web applications, or internal data processing could experience service outages or degraded performance due to server hangs or crashes induced by an attacker. This could lead to operational disruptions, loss of productivity, and potential financial losses. While the vulnerability does not compromise data confidentiality or integrity, the denial of service could indirectly impact business continuity and customer trust. Sectors such as finance, healthcare, e-commerce, and public services, which often rely on MySQL databases, may be particularly vulnerable. Given the requirement for high privileges, insider threats or compromised administrative accounts pose a higher risk. Additionally, the ability to exploit via multiple protocols increases the likelihood of attack vectors, especially in complex network environments. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Immediately audit and restrict high-privileged MySQL user accounts, ensuring the principle of least privilege is enforced and unnecessary administrative accounts are disabled or removed. 2) Harden network access controls by limiting MySQL Server exposure to trusted networks only, using firewalls and network segmentation to restrict protocol access to essential services and known IP addresses. 3) Monitor MySQL server logs and network traffic for unusual activity indicative of exploitation attempts, such as repeated connection attempts or abnormal stored procedure executions. 4) Implement robust authentication and access controls, including multi-factor authentication for administrative access to MySQL servers. 5) Prepare for patch deployment by closely monitoring Oracle's security advisories for the release of a fix and plan timely patch application to affected MySQL versions. 6) Consider deploying database activity monitoring (DAM) solutions to detect and alert on anomalous behaviors related to stored procedures or resource consumption. 7) Develop and test incident response plans to quickly recover from potential DoS attacks, including database failover and backup restoration procedures. These targeted actions go beyond generic advice by focusing on privilege management, network restrictions, and proactive monitoring tailored to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-06-11T22:56:56.111Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b00aa83201eaacd0445c
Added to database: 7/15/2025, 7:46:18 PM
Last enriched: 7/23/2025, 1:44:51 AM
Last updated: 8/5/2025, 3:47:37 AM
Views: 15
Related Threats
CVE-2025-5048: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk AutoCAD
HighCVE-2025-5047: CWE-457: Use of Uninitialized Variable in Autodesk AutoCAD
HighCVE-2025-5046: CWE-125 Out-of-Bounds Read in Autodesk AutoCAD
HighCVE-2025-54466: CWE-94 Improper Control of Generation of Code ('Code Injection') in Apache Software Foundation Apache OFBiz
CriticalCVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.