CVE-2025-53069

Source
https://cve.org/CVERecord?id=CVE-2025-53069
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-53069.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-53069
Downstream
Related
Published
2025-10-21T20:20:48.033Z
Modified
2026-04-11T01:48:21.775455Z
Severity
  • 4.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

References

Affected packages

Git / github.com/mysql/mysql-server

Affected ranges

Type
GIT
Repo
https://github.com/mysql/mysql-server
Events
Database specific
{
    "versions": [
        {
            "introduced": "8.0.0"
        },
        {
            "fixed": "8.0.43"
        },
        {
            "introduced": "8.4.0"
        },
        {
            "fixed": "8.4.6"
        },
        {
            "introduced": "9.0.0"
        },
        {
            "fixed": "9.4.0"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-53069.json"
vanir_signatures_modified
"2026-04-11T01:48:21Z"
vanir_signatures
[
    {
        "source": "https://github.com/mysql/mysql-server/commit/b79ac1111737174c1b36ab5f63275f0191c000dc",
        "digest": {
            "line_hashes": [
                "40519341972351148061927493253565560391",
                "92739509786593219801012166808793403257",
                "179023984236093010935222896814260303731",
                "256122672508829238289839645149202138909"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "storage/innobase/ddl/ddl0builder.cc"
        },
        "deprecated": false,
        "id": "CVE-2025-53069-49413a0d",
        "signature_version": "v1",
        "signature_type": "Line"
    },
    {
        "source": "https://github.com/mysql/mysql-server/commit/3f821bcb4ee93cd90c0ffa0f8e17bb9677502acf",
        "digest": {
            "line_hashes": [
                "40519341972351148061927493253565560391",
                "92739509786593219801012166808793403257",
                "179023984236093010935222896814260303731",
                "256122672508829238289839645149202138909"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "storage/innobase/ddl/ddl0builder.cc"
        },
        "deprecated": false,
        "id": "CVE-2025-53069-b64d8b57",
        "signature_version": "v1",
        "signature_type": "Line"
    },
    {
        "source": "https://github.com/mysql/mysql-server/commit/2d6d5e10436a8f2b58d37af737c2a3e45855d0b7",
        "digest": {
            "line_hashes": [
                "40519341972351148061927493253565560391",
                "92739509786593219801012166808793403257",
                "179023984236093010935222896814260303731",
                "256122672508829238289839645149202138909"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "storage/innobase/ddl/ddl0builder.cc"
        },
        "deprecated": false,
        "id": "CVE-2025-53069-fc8ed8c4",
        "signature_version": "v1",
        "signature_type": "Line"
    }
]