Skip to main content

CVE-2025-50104: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. in Oracle Corporation MySQL Server

Low
VulnerabilityCVE-2025-50104cvecve-2025-50104
Published: Tue Jul 15 2025 (07/15/2025, 19:27:51 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: MySQL Server

Description

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).

AI-Powered Analysis

AILast updated: 07/22/2025, 20:45:52 UTC

Technical Analysis

CVE-2025-50104 is a vulnerability identified in Oracle Corporation's MySQL Server affecting versions 8.0.0 through 8.0.42, 8.4.0 through 8.4.5, and 9.0.0 through 9.3.0. The vulnerability resides in the Server component related to Data Definition Language (DDL) processing. It allows a high-privileged attacker with network access via multiple protocols to exploit the flaw without requiring user interaction. The vulnerability is characterized by a low complexity of attack (AC:L) and requires the attacker to have high privileges (PR:H) on the system. Successful exploitation can lead to a partial denial of service (DoS) condition impacting the availability of the MySQL Server. The CVSS 3.1 base score is 2.7, indicating a low severity primarily due to its limited impact on availability and no impact on confidentiality or integrity. The vulnerability is associated with CWE-400, which relates to uncontrolled resource consumption, suggesting that the attack may cause resource exhaustion or degradation of service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects multiple major MySQL versions, which are widely used in enterprise environments for database management. Given the network accessibility and multiple protocol vectors, the attack surface is broad but constrained by the requirement for high privileges, limiting the ease of exploitation to already compromised or insider threat scenarios. The partial DoS effect implies that the server may experience degraded performance or partial service outages rather than full downtime.

Potential Impact

For European organizations, the impact of CVE-2025-50104 is primarily on the availability of MySQL database services. Many enterprises, including financial institutions, e-commerce platforms, and public sector organizations across Europe, rely heavily on MySQL for critical data storage and transaction processing. A partial denial of service could disrupt business operations, degrade user experience, and potentially delay critical data processing tasks. However, since the vulnerability requires high privileges, the risk of external attackers exploiting this flaw directly is reduced. The more significant risk lies in scenarios where an attacker has already gained elevated access, such as through insider threats or lateral movement after initial compromise. In such cases, this vulnerability could be leveraged to further disrupt services, complicate incident response, and increase operational costs. The absence of confidentiality or integrity impact means data breaches or data manipulation are not direct consequences of this vulnerability. Nonetheless, service disruption in sectors like healthcare, finance, or government could have cascading effects on service delivery and compliance with regulations such as GDPR, especially if downtime affects data availability or reporting.

Mitigation Recommendations

To mitigate CVE-2025-50104 effectively, European organizations should implement the following specific measures: 1) Restrict high-privilege access to MySQL servers strictly to trusted administrators and service accounts, employing the principle of least privilege to minimize the number of accounts with elevated rights. 2) Monitor and audit all privileged user activities on MySQL servers to detect unusual or unauthorized actions promptly. 3) Employ network segmentation and firewall rules to limit network access to MySQL servers only to necessary hosts and protocols, reducing exposure to potential attackers. 4) Implement robust intrusion detection and prevention systems (IDS/IPS) to identify and block suspicious network traffic targeting MySQL services. 5) Stay vigilant for Oracle's official patches or updates addressing this vulnerability and apply them promptly once available. 6) Conduct regular vulnerability assessments and penetration testing focusing on privilege escalation and resource exhaustion scenarios to identify and remediate weaknesses proactively. 7) Prepare and test incident response plans that include scenarios involving partial denial of service on database servers to ensure rapid recovery and minimal operational impact. These targeted actions go beyond generic advice by focusing on controlling privileged access, network exposure, and proactive detection tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-11T22:56:56.113Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b00ca83201eaacd044c2

Added to database: 7/15/2025, 7:46:20 PM

Last enriched: 7/22/2025, 8:45:52 PM

Last updated: 8/20/2025, 11:43:19 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats