CVE-2025-50081
BaseFortify
Publication date: 2025-07-15
Last updated on: 2025-07-17
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | mysql | From 8.0.0 (inc) to 8.0.42 (inc) |
| oracle | mysql | From 8.4.0 (inc) to 8.4.5 (inc) |
| oracle | mysql | From 9.0.0 (inc) to 9.3.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the MySQL Client product of Oracle MySQL, specifically in the mysqldump component. It is difficult to exploit and requires a high privileged attacker with network access through multiple protocols, as well as human interaction from someone other than the attacker. If successfully exploited, it can allow unauthorized update, insert, or delete access to some data accessible by the MySQL Client, as well as unauthorized read access to a subset of that data.
How can this vulnerability impact me? :
The impact of this vulnerability includes unauthorized modification (update, insert, delete) and unauthorized reading of some data accessible by the MySQL Client. This could lead to data integrity and confidentiality issues, potentially compromising the affected data within the MySQL Client environment.