CVE-2025-50092: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2025-50092 is a medium-severity vulnerability affecting Oracle Corporation's MySQL Server, specifically within the InnoDB component. The affected versions include 8.0.0 through 8.0.42, 8.4.0 through 8.4.5, and 9.0.0 through 9.3.0. This vulnerability allows a high-privileged attacker with network access via multiple protocols to cause a denial of service (DoS) condition by triggering a hang or frequent crashes of the MySQL Server. The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, indicating that the attack likely exploits resource exhaustion to disrupt service availability. The CVSS 3.1 base score is 4.9, reflecting a medium severity primarily due to its impact on availability (A:H) without affecting confidentiality or integrity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and high privileges (PR:H), with no user interaction needed (UI:N). The scope remains unchanged (S:U). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's nature suggests that an attacker with administrative or equivalent privileges on the network could repeatedly crash or hang the MySQL Server, leading to service interruptions and potential operational disruptions. Given the widespread use of MySQL Server in enterprise environments, this vulnerability poses a risk to database availability, which is critical for business continuity and service reliability.
Potential Impact
For European organizations, the primary impact of CVE-2025-50092 is the potential for denial of service against MySQL Server instances. This can disrupt business-critical applications relying on MySQL databases, including e-commerce platforms, financial services, healthcare systems, and public sector services. The availability impact could lead to operational downtime, loss of productivity, and potential financial losses. Organizations with high-privileged users who have network access to MySQL servers are at risk, especially if these servers are exposed to internal or external networks. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not diminish the operational risks associated with service outages. European organizations with strict service level agreements (SLAs) and regulatory requirements for uptime and availability (e.g., in finance or healthcare sectors) could face compliance challenges if this vulnerability is exploited. Additionally, repeated crashes may complicate incident response and recovery efforts, increasing downtime duration.
Mitigation Recommendations
1. Restrict network access to MySQL Server instances strictly to trusted and necessary users and systems, minimizing exposure to high-privileged accounts over the network. 2. Implement network segmentation and firewall rules to limit access to MySQL ports from untrusted networks. 3. Monitor MySQL Server logs and system performance metrics for signs of hangs or crashes that could indicate exploitation attempts. 4. Apply the principle of least privilege to MySQL user accounts, ensuring that high-privileged network access is granted only when absolutely necessary. 5. Prepare incident response plans specifically for MySQL service disruptions, including automated failover or restart procedures to minimize downtime. 6. Stay alert for official patches or updates from Oracle and plan rapid deployment once available. 7. Consider deploying MySQL in high-availability configurations to mitigate the impact of potential DoS conditions. 8. Conduct regular vulnerability assessments and penetration testing focusing on database services to detect and remediate exposure to this and similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-50092: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2025-50092 is a medium-severity vulnerability affecting Oracle Corporation's MySQL Server, specifically within the InnoDB component. The affected versions include 8.0.0 through 8.0.42, 8.4.0 through 8.4.5, and 9.0.0 through 9.3.0. This vulnerability allows a high-privileged attacker with network access via multiple protocols to cause a denial of service (DoS) condition by triggering a hang or frequent crashes of the MySQL Server. The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, indicating that the attack likely exploits resource exhaustion to disrupt service availability. The CVSS 3.1 base score is 4.9, reflecting a medium severity primarily due to its impact on availability (A:H) without affecting confidentiality or integrity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and high privileges (PR:H), with no user interaction needed (UI:N). The scope remains unchanged (S:U). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's nature suggests that an attacker with administrative or equivalent privileges on the network could repeatedly crash or hang the MySQL Server, leading to service interruptions and potential operational disruptions. Given the widespread use of MySQL Server in enterprise environments, this vulnerability poses a risk to database availability, which is critical for business continuity and service reliability.
Potential Impact
For European organizations, the primary impact of CVE-2025-50092 is the potential for denial of service against MySQL Server instances. This can disrupt business-critical applications relying on MySQL databases, including e-commerce platforms, financial services, healthcare systems, and public sector services. The availability impact could lead to operational downtime, loss of productivity, and potential financial losses. Organizations with high-privileged users who have network access to MySQL servers are at risk, especially if these servers are exposed to internal or external networks. The lack of impact on confidentiality and integrity reduces the risk of data breaches but does not diminish the operational risks associated with service outages. European organizations with strict service level agreements (SLAs) and regulatory requirements for uptime and availability (e.g., in finance or healthcare sectors) could face compliance challenges if this vulnerability is exploited. Additionally, repeated crashes may complicate incident response and recovery efforts, increasing downtime duration.
Mitigation Recommendations
1. Restrict network access to MySQL Server instances strictly to trusted and necessary users and systems, minimizing exposure to high-privileged accounts over the network. 2. Implement network segmentation and firewall rules to limit access to MySQL ports from untrusted networks. 3. Monitor MySQL Server logs and system performance metrics for signs of hangs or crashes that could indicate exploitation attempts. 4. Apply the principle of least privilege to MySQL user accounts, ensuring that high-privileged network access is granted only when absolutely necessary. 5. Prepare incident response plans specifically for MySQL service disruptions, including automated failover or restart procedures to minimize downtime. 6. Stay alert for official patches or updates from Oracle and plan rapid deployment once available. 7. Consider deploying MySQL in high-availability configurations to mitigate the impact of potential DoS conditions. 8. Conduct regular vulnerability assessments and penetration testing focusing on database services to detect and remediate exposure to this and similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-06-11T22:56:56.112Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b00ba83201eaacd04494
Added to database: 7/15/2025, 7:46:19 PM
Last enriched: 7/22/2025, 8:47:35 PM
Last updated: 11/14/2025, 3:33:41 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13161: CWE-23 Relative Path Traversal in IQ Service International IQ-Support
HighCVE-2025-13160: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IQ Service International IQ-Support
MediumCVE-2025-9479: Out of bounds read in Google Chrome
UnknownCVE-2025-13107: Inappropriate implementation in Google Chrome
UnknownCVE-2025-13102: Inappropriate implementation in Google Chrome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.