Skip to main content

CVE-2025-50095: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server

Medium
VulnerabilityCVE-2025-50095cvecve-2025-50095
Published: Tue Jul 15 2025 (07/15/2025, 19:27:47 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 07/22/2025, 20:48:14 UTC

Technical Analysis

CVE-2025-50095 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically affecting versions 9.0.0 through 9.3.0 within the Server Optimizer component. The vulnerability allows a high-privileged attacker with network access via multiple protocols to exploit the flaw without requiring user interaction. The primary impact of this vulnerability is on availability, enabling the attacker to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS). The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption leading to DoS conditions. The CVSS 3.1 base score is 4.9, indicating a medium severity level, with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H. This means the attack can be launched remotely over the network with low attack complexity but requires the attacker to have high privileges on the system. There is no impact on confidentiality or integrity, only availability is affected. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects the MySQL Server optimizer, which is a critical component responsible for query execution planning, and its disruption can severely affect database availability and reliability.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of MySQL Server instances running affected versions. Organizations relying on MySQL for critical applications, including financial services, healthcare, government, and e-commerce, could experience service outages or degraded performance if exploited. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised credentials or systems with elevated access. However, once exploited, the resulting denial of service could disrupt business operations, cause data processing delays, and impact service-level agreements. Given the widespread use of MySQL in Europe across various sectors, the vulnerability could lead to operational disruptions and potential reputational damage. The absence of confidentiality or integrity impact reduces risks related to data breaches but does not diminish the operational risks associated with service unavailability.

Mitigation Recommendations

European organizations should prioritize upgrading MySQL Server instances to versions beyond 9.3.0 once official patches or updates are released by Oracle. Until patches are available, organizations should implement strict access controls to limit high-privileged user accounts and monitor for unusual activity indicative of exploitation attempts. Network segmentation and firewall rules should restrict access to MySQL Server ports to trusted hosts only. Employing intrusion detection and prevention systems (IDS/IPS) with signatures for anomalous MySQL traffic can help detect exploitation attempts. Regular auditing of user privileges and enforcing the principle of least privilege will reduce the risk of high-privileged attackers gaining access. Additionally, organizations should maintain robust backup and recovery procedures to minimize downtime impact in case of a successful DoS attack. Monitoring MySQL server logs for crashes or hangs and setting up alerting mechanisms can enable rapid response to incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-11T22:56:56.112Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b00ba83201eaacd0449d

Added to database: 7/15/2025, 7:46:19 PM

Last enriched: 7/22/2025, 8:48:14 PM

Last updated: 8/5/2025, 12:35:45 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats