We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30722



Description

Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Client accessible data as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N).

Reserved 2025-03-25 | Published 2025-04-15 | Updated 2025-04-19 | Assigner oracle


MEDIUM: 5.3CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Cluster accessible data.

Product status

7.6.0
affected

8.0.0
affected

8.4.0
affected

9.0.0
affected

8.0.0
affected

8.4.0
affected

9.0.0
affected

References

www.oracle.com/security-alerts/cpuapr2025.html (Oracle Advisory) vendor-advisory

cve.org (CVE-2025-30722)

nvd.nist.gov (CVE-2025-30722)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30722

Support options

Helpdesk Chat, Email, Knowledgebase