MySQL, Privilege Escalation, CVE-2025-21567 (Medium)

How CVE-2025-21567 Works

This vulnerability exists in MySQL Server’s privilege handling component (versions ≤9.1.0). Attackers with low privileges can exploit incorrect access control checks via network protocols (TCP/IP, named pipes). The flaw occurs when validating user roles during metadata queries, allowing unauthorized SELECT operations on certain system tables. MySQL fails to properly enforce the REQUIRED_PRIVILEGES flag when processing INFORMATION_SCHEMA requests, leaking data like user permissions or schema details. The attack requires valid credentials but no admin rights.

DailyCVE Form

Platform: MySQL
Version: ≤9.1.0
Vulnerability: Privilege Escalation
Severity: Medium
Date: 04/08/2025

What Undercode Say:

Exploitation:

-- Proof-of-Concept:
CREATE USER 'attacker'@'%' IDENTIFIED BY 'weakpass';
GRANT SELECT ON . TO 'attacker'@'%';
EXPLOIT:
SELECT FROM INFORMATION_SCHEMA.TABLES WHERE TABLE_SCHEMA='mysql';
-- Bypasses privilege checks for 'user' table metadata

Detection:

Check MySQL version:
mysql --version | grep -E "9.1.0|earlier"
Audit logs for suspicious metadata queries:
grep "INFORMATION_SCHEMA" /var/log/mysql/mysql.log

Protection:

1. Apply Oracle patch 9.1.0.1+

2. Restrict network access:

my.cnf mitigation:
[bash]
skip-networking=1
required_privileges=STRICT

3. Revoke unnecessary SELECT privileges:

REVOKE SELECT ON INFORMATION_SCHEMA. FROM 'public'@'%';

Analytics:

  • Attack Vector: Network (AV:N)
  • Exploitability: Low Privilege (PR:L)
  • Impact: Confidentiality (C:L)
  • CVSS 4.0 Temp Score: 5.1 (Medium)
  • Observed in wild: No

References:

  • Oracle Advisory: CPUJan2025
  • Mitre: CWE-285 (Improper Authorization)
  • Patch Link: [Oracle MySQL Downloads]

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-21567
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top