Skip to main content

CVE-2025-50089: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server

Medium
VulnerabilityCVE-2025-50089cvecve-2025-50089
Published: Tue Jul 15 2025 (07/15/2025, 19:27:44 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 07/22/2025, 20:46:56 UTC

Technical Analysis

CVE-2025-50089 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically affecting versions 9.0.0 through 9.1.0. The flaw resides in the Server Optimizer component and allows a high-privileged attacker with network access to exploit the vulnerability via multiple protocols. The vulnerability enables the attacker to cause a denial-of-service (DoS) condition by forcing the MySQL Server to hang or crash repeatedly. The CVSS 3.1 base score of 4.9 reflects a medium severity primarily due to its impact on availability without affecting confidentiality or integrity. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L), but necessitates high privileges (PR:H) and no user interaction (UI:N). The scope remains unchanged (S:U), indicating the vulnerability affects only the vulnerable component. The underlying weakness is categorized under CWE-400, which relates to uncontrolled resource consumption, typically leading to DoS conditions. No known exploits are currently reported in the wild, and no patches have been linked yet, which suggests that mitigation may rely on vendor updates or configuration changes once available. The vulnerability's exploitation could disrupt database availability, impacting applications and services dependent on MySQL Server, especially in environments where high-privileged network access is possible.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of critical database services running MySQL Server versions 9.0.0 to 9.1.0. Organizations relying on MySQL for transactional systems, web applications, or internal data processing could experience service interruptions, leading to operational downtime and potential financial losses. The DoS nature of the vulnerability means attackers can disrupt business continuity without needing to compromise data confidentiality or integrity. Given that the attack requires high privileges, the threat is more pronounced in environments where internal or external attackers have elevated access, such as misconfigured networks or compromised administrative accounts. The impact is particularly critical for sectors with stringent uptime requirements, including finance, healthcare, and public services prevalent in Europe. Additionally, the lack of current exploits in the wild provides a window for proactive mitigation, but the absence of patches necessitates cautious network and access control management to minimize exposure.

Mitigation Recommendations

1. Restrict network access to MySQL Server instances to trusted hosts and networks only, employing firewalls and network segmentation to limit exposure. 2. Enforce strict access controls and privilege management to ensure that only authorized users have high-level privileges on MySQL Servers. 3. Monitor and audit administrative access and network traffic to detect unusual activities that could indicate exploitation attempts. 4. Apply vendor patches promptly once available; in the meantime, consider upgrading to unaffected MySQL versions if feasible. 5. Implement resource usage monitoring on MySQL Servers to detect abnormal consumption patterns that may precede a DoS attack. 6. Use intrusion detection/prevention systems (IDS/IPS) tuned to recognize anomalous protocol behaviors targeting MySQL. 7. Consider deploying database failover and redundancy mechanisms to maintain availability in case of service disruption. These steps go beyond generic advice by focusing on access restriction, privilege hardening, and proactive monitoring tailored to the vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-11T22:56:56.112Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b00ba83201eaacd04481

Added to database: 7/15/2025, 7:46:19 PM

Last enriched: 7/22/2025, 8:46:56 PM

Last updated: 8/14/2025, 11:31:38 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats