MariaDB 11.8.5 Audit Plugin: Double-Hyphen Comments Not Logged
CVE-2026-3494 Published on March 3, 2026
MariaDB Server Audit Plugin Comment Handling Bypass
In MariaDB server version through 11.8.5, when server audit plugin is enabled with server_audit_events variable configured with QUERY_DCL, QUERY_DDL, or QUERY_DML filtering, if an authenticated database user invokes a SQL statement prefixed with double-hyphen () or hash (#) style comments, the statement is not logged.
Vulnerability Analysis
CVE-2026-3494 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.
Weakness Type
Insufficient Logging
When a security-critical event occurs, the software either does not record the event or omits important details about the event when logging it. When security-critical events are not logged properly, such as a failed login attempt, this can make malicious behavior more difficult to detect and may hinder forensic analysis after an attack succeeds.
Products Associated with CVE-2026-3494
Want to know whenever a new CVE is published for Amazon Aws? stack.watch will email you.
Affected Versions
MariaDB Foundation MariaDB Server:- Version 10.6.25 is unaffected.
- Version 10.11.16 is unaffected.
- Version 11.4.10 is unaffected.
- Version 11.8.6 is unaffected.
- Version 2.12.6 is unaffected.
- Version 3.04.6 is unaffected.
- Version 3.10.3 is unaffected.
- Version 3.11.1 is unaffected.
- Version 5.7.44-RDS.20260212 is unaffected.
- Version 8.0.45 is unaffected.
- Version 8.4.8 is unaffected.
- Version 10.6.25 is unaffected.
- Version 10.11.16 is unaffected.
- Version 11.4.10 is unaffected.
- Version 11.8.6 is unaffected.