CVE-2026-22015
Information Schema Exposure in Oracle MySQL Server Allows Data Leak
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | mysql_server | From 8.0.0 (inc) to 8.0.45 (inc) |
| oracle | mysql_server | From 8.4.0 (inc) to 8.4.8 (inc) |
| oracle | mysql_server | From 9.0.0 (inc) to 9.6.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthorized read access to a subset of MySQL Server accessible data by a low privileged attacker with network access. Such unauthorized data exposure could potentially impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding sensitive data against unauthorized access.
However, the provided information does not specify exact compliance impacts or whether the exposed data includes regulated personal or health information.
Can you explain this vulnerability to me?
This vulnerability exists in the MySQL Server product of Oracle MySQL, specifically in the Server: Information Schema component. It affects supported versions 8.0.0-8.0.45, 8.4.0-8.4.8, and 9.0.0-9.6.0.
The vulnerability is easily exploitable by a low privileged attacker who has network access through multiple protocols. Successful exploitation can lead to unauthorized read access to a subset of data accessible by the MySQL Server.
How can this vulnerability impact me? :
The impact of this vulnerability is unauthorized disclosure of data. An attacker with low privileges and network access can read some data from the MySQL Server that they should not have access to.
The vulnerability does not affect data integrity or availability, but it compromises confidentiality to a limited extent.