CVE-2026-34270
Denial of Service in Oracle MySQL Group Replication Plugin
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | mysql_server | From 8.0.0 (inc) to 8.0.45 (inc) |
| oracle | mysql_server | From 8.4.0 (inc) to 8.4.8 (inc) |
| oracle | mysql_server | From 9.0.0 (inc) to 9.6.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the MySQL Server product of Oracle MySQL, specifically in the Server: Group Replication Plugin component. It affects supported versions 8.0.0-8.0.45, 8.4.0-8.4.8, and 9.0.0-9.6.0.
The vulnerability is easily exploitable by a low privileged attacker who has network access through multiple protocols. Such an attacker can compromise the MySQL Server.
Successful exploitation can result in the attacker causing the MySQL Server to hang or crash repeatedly, leading to a complete denial of service (DoS).
How can this vulnerability impact me? :
The primary impact of this vulnerability is on the availability of the MySQL Server.
An attacker with low privileges and network access can cause the server to hang or crash repeatedly, resulting in a denial of service (DoS).
This means that legitimate users may be unable to access the database services, potentially disrupting business operations that rely on MySQL Server.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability results in a denial of service (DoS) condition by allowing an attacker to cause the MySQL Server to hang or crash repeatedly. It does not impact confidentiality or integrity of data.
Since the vulnerability affects availability only and does not lead to unauthorized data access or modification, its direct impact on compliance with standards like GDPR or HIPAA, which primarily focus on data privacy and integrity, is limited.
However, availability is also a component of many compliance frameworks, so prolonged or repeated outages caused by this vulnerability could potentially affect compliance related to system availability requirements.