Listen to this Post
How CVE-2025-21520 Works
This vulnerability affects MySQL Server (Server: Options component) in versions 8.0.40 and prior, 8.4.3 and prior, and 9.1.0 and prior. A high-privileged attacker with local access can exploit it to read restricted MySQL data, but exploitation requires additional human interaction from another user. The attack complexity is high (AC:H) due to the need for specific local access conditions and user-assisted actions. The CVSS 3.1 score is 1.8 (Low), reflecting limited confidentiality impact (C:L) without integrity or availability loss.
DailyCVE Form
Platform: MySQL Server
Version: 8.0.40, 8.4.3, 9.1.0
Vulnerability: Information Disclosure
Severity: Low
Date: 04/09/2025
What Undercode Say:
Exploitation Analysis
- Requires local high-privileged access (
PR:H
). - Exploitable via malicious options manipulation.
- Human interaction (
UI:R
) is a key constraint.
Detection Commands
mysql --version | grep -E "8.0.40|8.4.3|9.1.0"
SHOW VARIABLES LIKE 'version%';
Exploit PoC (Conceptual)
// Local privilege escalation via options abuse include <mysql.h> void exploit() { MYSQL conn = mysql_init(NULL); mysql_real_connect(conn, "localhost", "admin", "pass", NULL, 0, NULL, CLIENT_LOCAL_FILES); // Trigger options parsing flaw mysql_options(conn, MYSQL_OPT_LOCAL_INFILE, 1); }
Mitigation Steps
- Patch: Upgrade to MySQL 8.0.41+, 8.4.4+, or 9.1.1+.
2. Restrict Access:
REVOKE FILE ON . FROM 'admin'@'localhost';
3. Audit Logs:
grep -r "OPTIONS" /var/log/mysql/error.log
Configuration Hardening
[bash] local_infile=OFF secure_file_priv=/restricted
CVSS 4.0 Mapping
- Attack Vector: Local (AV:L)
- Impact: Confidentiality Low (VC:L)
- Mitigation Level: Official Patch (MS:U)
References
- Oracle Critical Patch Update: January 2025
- NVD Entry: CVE-2025-21520
References:
Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-21520
Extra Source Hub:
Undercode