Description
HeidiSQL 9.5.0.5196 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long file path in the logging preferences. Attackers can input a buffer-overflow payload through the SQL log file path field in Preferences > Logging to trigger an application crash.
Published: 2026-03-30
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability is a buffer overflow in HeidiSQL 9.5.0.5196 that occurs when a local user supplies an excessively long file path in the SQL log file path field of the Preferences → Logging dialog. This input overflows an internal buffer, causing the application to crash. The impact is a denial of service for the user; an attacker with local access can repeatedly trigger the crash, disrupting normal database‑management operations. The weakness is identified as CWE‑98.

Affected Systems

The vulnerable product is HeidiSQL client release 9.5.0.5196. Any workstation running this specific build is susceptible. No other HeidiSQL versions are listed as affected, and the flaw does not appear to impact different releases.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, while the EPSS score of less than 1% suggests a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, implying no known widespread exploitation. An attacker must have local access to manipulate the logging preferences; remote exploitation is not feasible. Nevertheless, the crash can be disruptive and the flaw should be mitigated promptly.

Generated by OpenCVE AI on April 8, 2026 at 18:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the installed HeidiSQL version is 9.5.0.5196.
  • Download and install the latest HeidiSQL release from the official website.
  • If an update cannot be performed immediately, reset the SQL log file path to its default value or disable logging in Preferences → Logging to avoid the overflow condition.
  • Close and restart HeidiSQL to apply the changes.

Generated by OpenCVE AI on April 8, 2026 at 18:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:heidisql:heidisql:*:*:*:*:*:*:*:*

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Heidisql
Heidisql heidisql
Vendors & Products Heidisql
Heidisql heidisql

Mon, 30 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 11:15:00 +0000

Type Values Removed Values Added
Description HeidiSQL 9.5.0.5196 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long file path in the logging preferences. Attackers can input a buffer-overflow payload through the SQL log file path field in Preferences > Logging to trigger an application crash.
Title HeidiSQL 9.5.0.5196 Denial of Service via Preferences
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Heidisql Heidisql
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-30T14:51:48.071Z

Reserved: 2026-03-30T10:57:31.761Z

Link: CVE-2018-25231

cve-icon Vulnrichment

Updated: 2026-03-30T12:50:06.837Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-30T12:16:16.860

Modified: 2026-04-08T17:27:35.193

Link: CVE-2018-25231

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T20:00:43Z

Weaknesses