Skip to main content

CVE-2025-50100: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. in Oracle Corporation MySQL Server

Low
VulnerabilityCVE-2025-50100cvecve-2025-50100
Published: Tue Jul 15 2025 (07/15/2025, 19:27:49 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).

AI-Powered Analysis

AILast updated: 07/22/2025, 20:38:01 UTC

Technical Analysis

CVE-2025-50100 is a vulnerability identified in Oracle Corporation's MySQL Server, specifically affecting the Server component responsible for thread pooling. The affected versions include 8.0.0 through 8.0.42, 8.4.0 through 8.4.5, and 9.0.0 through 9.3.0. This vulnerability is characterized as difficult to exploit and requires an attacker to have high privileges and network access via multiple protocols. The vulnerability does not require user interaction and does not impact confidentiality or integrity but affects availability by enabling an attacker to cause a partial denial of service (DoS) condition on the MySQL Server. The underlying weakness is related to CWE-400, which involves uncontrolled resource consumption, suggesting that the vulnerability could be exploited to exhaust server resources, leading to degraded service or partial outages. The CVSS 3.1 base score is 2.2, indicating a low severity primarily due to the high complexity of exploitation, the requirement for high privileges, and the limited impact scope. No known exploits are currently reported in the wild, and no patches are linked in the provided data, indicating that remediation may still be pending or in progress. The vulnerability affects multiple MySQL versions widely used in enterprise environments, especially where thread pooling is enabled to optimize database performance under concurrent workloads.

Potential Impact

For European organizations, the impact of CVE-2025-50100 is primarily on the availability of MySQL Server instances. Organizations relying on MySQL for critical applications may experience partial service disruptions if a high-privileged attacker exploits this vulnerability to trigger resource exhaustion or thread pooling issues. While the vulnerability does not compromise data confidentiality or integrity, partial denial of service can affect business continuity, especially in sectors with high database transaction volumes such as finance, e-commerce, and public services. The requirement for high privileges and network access limits the attack surface to insiders or attackers who have already gained elevated access, reducing the likelihood of widespread exploitation. However, in environments where MySQL servers are exposed to internal networks or where privilege escalation is possible, the risk increases. Given the widespread use of MySQL in European enterprises and public sector organizations, even a low-severity availability disruption can have operational and reputational consequences.

Mitigation Recommendations

To mitigate CVE-2025-50100, European organizations should: 1) Restrict network access to MySQL servers, ensuring that only trusted hosts and users with legitimate needs have connectivity, minimizing exposure to potential attackers. 2) Enforce strict privilege management by auditing and limiting high-privilege accounts, applying the principle of least privilege to reduce the risk of insider threats or compromised credentials being leveraged. 3) Monitor MySQL server performance and thread pooling metrics to detect unusual resource consumption patterns that may indicate exploitation attempts. 4) Apply any available patches or updates from Oracle promptly once released; in the absence of patches, consider disabling or tuning thread pooling features if feasible to reduce the attack surface. 5) Implement network segmentation and intrusion detection systems to identify and block suspicious activities targeting database servers. 6) Conduct regular security assessments and penetration testing focusing on privilege escalation and resource exhaustion scenarios within the database environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-11T22:56:56.113Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b00ba83201eaacd044ac

Added to database: 7/15/2025, 7:46:19 PM

Last enriched: 7/22/2025, 8:38:01 PM

Last updated: 8/18/2025, 5:07:45 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats