Oracle MySQL Server Replication DOS 8.0.x-8.0.41/8.4.x-8.4.4/9.0.x-9.2.0
CVE-2025-30681 Published on April 15, 2025
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
Vulnerability Analysis
CVE-2025-30681 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a small impact on availability.
Weakness Type
What is a Resource Exhaustion Vulnerability?
The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
CVE-2025-30681 has been classified to as a Resource Exhaustion vulnerability or weakness.
Products Associated with CVE-2025-30681
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-30681 are published in these products:
Affected Versions
Oracle Corporation MySQL Cluster:- Version 7.6.0, <= 7.6.33 is affected.
- Version 8.0.0, <= 8.0.41 is affected.
- Version 8.4.0, <= 8.4.4 is affected.
- Version 9.0.0, <= 9.2.0 is affected.
- Version 8.0.0, <= 8.0.41 is affected.
- Version 8.4.0, <= 8.4.4 is affected.
- Version 9.0.0, <= 9.2.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.