CVE-2026-34293
Denial of Service in Oracle MySQL Server DML Component
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | mysql_server | From 8.0.0 (inc) to 8.0.45 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the MySQL Server product of Oracle MySQL, specifically in the Server: DML component. It affects supported versions from 8.0.0 to 8.0.45. The vulnerability is easily exploitable by a high privileged attacker who has network access through multiple protocols.
If successfully exploited, the attacker can cause the MySQL Server to hang or crash repeatedly, resulting in a complete denial of service (DoS).
How can this vulnerability impact me? :
The primary impact of this vulnerability is on the availability of the MySQL Server. An attacker with high privileges and network access can exploit this vulnerability to cause the server to hang or crash repeatedly.
This results in a denial of service (DoS), making the MySQL Server unavailable to legitimate users and potentially disrupting business operations that depend on the database.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows a high privileged attacker to cause a denial of service (DoS) by hanging or crashing the MySQL Server, impacting availability.
However, there is no indication from the provided information that this vulnerability leads to unauthorized disclosure, modification, or loss of data.
Therefore, while availability impacts could affect operational continuity, there is no direct evidence that this vulnerability compromises confidentiality or integrity, which are critical for compliance with standards like GDPR or HIPAA.
As a result, the vulnerability's effect on compliance with such regulations is limited to potential availability concerns.