CVE-2026-22009
Denial of Service in Oracle MySQL Server Optimizer Component
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | mysql_server | From 8.0.0 (inc) to 8.0.45 (inc) |
| oracle | mysql_server | From 8.4.0 (inc) to 8.4.8 (inc) |
| oracle | mysql_server | From 9.0.0 (inc) to 9.6.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the MySQL Server product of Oracle MySQL, specifically in the Server Optimizer component. It affects supported versions 8.0.0 through 8.0.45, 8.4.0 through 8.4.8, and 9.0.0 through 9.6.0.
The vulnerability is easily exploitable by a low privileged attacker who has network access via multiple protocols. Exploiting this vulnerability allows the attacker to compromise the MySQL Server.
Successful exploitation can cause the MySQL Server to hang or repeatedly crash, resulting in a complete denial of service (DoS).
How can this vulnerability impact me? :
The primary impact of this vulnerability is on the availability of the MySQL Server.
An attacker with low privileges and network access can cause the server to hang or crash repeatedly, leading to a denial of service condition.
This means that legitimate users and applications relying on the MySQL Server may experience service interruptions or outages.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability results in a denial of service (DoS) condition by allowing an attacker to cause the MySQL Server to hang or crash repeatedly. It does not involve unauthorized access to data, data modification, or data disclosure.
Since the vulnerability impacts availability but not confidentiality or integrity, its direct effect on compliance with standards like GDPR or HIPAAβwhich primarily focus on protecting personal data confidentiality and integrityβis limited.
However, availability is also a component of many security frameworks, and prolonged denial of service could indirectly affect compliance by disrupting services that handle regulated data.