CVE-2025-50095: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
CVE-2025-50095 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically affecting versions 9.0.0 through 9.3.0 within the Server Optimizer component. The vulnerability allows a high-privileged attacker with network access via multiple protocols to exploit the flaw without requiring user interaction. The primary impact of this vulnerability is on availability, enabling the attacker to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS). The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption leading to DoS conditions. The CVSS 3.1 base score is 4.9, indicating a medium severity level, with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H. This means the attack can be launched remotely over the network with low attack complexity but requires the attacker to have high privileges on the system. There is no impact on confidentiality or integrity, only availability is affected. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects the MySQL Server optimizer, which is a critical component responsible for query execution planning, and its disruption can severely affect database availability and reliability.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of MySQL Server instances running affected versions. Organizations relying on MySQL for critical applications, including financial services, healthcare, government, and e-commerce, could experience service outages or degraded performance if exploited. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised credentials or systems with elevated access. However, once exploited, the resulting denial of service could disrupt business operations, cause data processing delays, and impact service-level agreements. Given the widespread use of MySQL in Europe across various sectors, the vulnerability could lead to operational disruptions and potential reputational damage. The absence of confidentiality or integrity impact reduces risks related to data breaches but does not diminish the operational risks associated with service unavailability.
Mitigation Recommendations
European organizations should prioritize upgrading MySQL Server instances to versions beyond 9.3.0 once official patches or updates are released by Oracle. Until patches are available, organizations should implement strict access controls to limit high-privileged user accounts and monitor for unusual activity indicative of exploitation attempts. Network segmentation and firewall rules should restrict access to MySQL Server ports to trusted hosts only. Employing intrusion detection and prevention systems (IDS/IPS) with signatures for anomalous MySQL traffic can help detect exploitation attempts. Regular auditing of user privileges and enforcing the principle of least privilege will reduce the risk of high-privileged attackers gaining access. Additionally, organizations should maintain robust backup and recovery procedures to minimize downtime impact in case of a successful DoS attack. Monitoring MySQL server logs for crashes or hangs and setting up alerting mechanisms can enable rapid response to incidents.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-50095: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. in Oracle Corporation MySQL Server
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2025-50095 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically affecting versions 9.0.0 through 9.3.0 within the Server Optimizer component. The vulnerability allows a high-privileged attacker with network access via multiple protocols to exploit the flaw without requiring user interaction. The primary impact of this vulnerability is on availability, enabling the attacker to cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS). The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption leading to DoS conditions. The CVSS 3.1 base score is 4.9, indicating a medium severity level, with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H. This means the attack can be launched remotely over the network with low attack complexity but requires the attacker to have high privileges on the system. There is no impact on confidentiality or integrity, only availability is affected. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects the MySQL Server optimizer, which is a critical component responsible for query execution planning, and its disruption can severely affect database availability and reliability.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of MySQL Server instances running affected versions. Organizations relying on MySQL for critical applications, including financial services, healthcare, government, and e-commerce, could experience service outages or degraded performance if exploited. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised credentials or systems with elevated access. However, once exploited, the resulting denial of service could disrupt business operations, cause data processing delays, and impact service-level agreements. Given the widespread use of MySQL in Europe across various sectors, the vulnerability could lead to operational disruptions and potential reputational damage. The absence of confidentiality or integrity impact reduces risks related to data breaches but does not diminish the operational risks associated with service unavailability.
Mitigation Recommendations
European organizations should prioritize upgrading MySQL Server instances to versions beyond 9.3.0 once official patches or updates are released by Oracle. Until patches are available, organizations should implement strict access controls to limit high-privileged user accounts and monitor for unusual activity indicative of exploitation attempts. Network segmentation and firewall rules should restrict access to MySQL Server ports to trusted hosts only. Employing intrusion detection and prevention systems (IDS/IPS) with signatures for anomalous MySQL traffic can help detect exploitation attempts. Regular auditing of user privileges and enforcing the principle of least privilege will reduce the risk of high-privileged attackers gaining access. Additionally, organizations should maintain robust backup and recovery procedures to minimize downtime impact in case of a successful DoS attack. Monitoring MySQL server logs for crashes or hangs and setting up alerting mechanisms can enable rapid response to incidents.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-06-11T22:56:56.112Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b00ba83201eaacd0449d
Added to database: 7/15/2025, 7:46:19 PM
Last enriched: 7/22/2025, 8:48:14 PM
Last updated: 8/5/2025, 12:35:45 AM
Views: 7
Related Threats
CVE-2025-54475: CWE-89: Improper Neutralization of Special Elements used in an SQL Command in joomsky.com JS Jobs component for Joomla
HighCVE-2025-54474: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in dj-extensions.com DJ-Classifieds component for Joomla
HighCVE-2025-54473: CWE-434 Unrestricted Upload of File with Dangerous Type in phoca.cz phoca.cz - Phoca Commander for Joomla
CriticalCVE-2025-9050: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9047: SQL Injection in projectworlds Visitor Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.