First published: Tue Apr 15 2025(Updated: )
Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Client accessible data as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL | >=8.0.0<=8.0.41>=8.4.0<=8.4.4>=9.0.0<=9.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30722 is categorized as a difficult-to-exploit vulnerability that allows a low privileged attacker to compromise MySQL Client.
To fix CVE-2025-30722, upgrade your MySQL Client to a version that is not affected, specifically versions higher than 8.0.41, 8.4.4, and 9.2.0.
CVE-2025-30722 affects MySQL Client versions 8.0.0 through 8.0.41, 8.4.0 through 8.4.4, and 9.0.0 through 9.2.0.
Yes, CVE-2025-30722 can be exploited remotely by a low privileged attacker with network access.
CVE-2025-30722 specifically affects the 'Client: mysqldump' component of the MySQL Client.