Impact
The vulnerability lies in the Information Schema component of Oracle MySQL Server. An attacker with high privileges and network access can read a subset of server data, leading to confidentiality compromise. The flaw is classified as an Information Exposure weakness (CWE‑200) and presents inadequate error handling (CWE‑538). The CVE description highlights that a high‑privileged user can exploit the flaw to obtain unauthorized data.
Affected Systems
Oracle MySQL Server versions 8.0.0 through 8.0.45, 8.4.0 through 8.4.8, and 9.0.0 through 9.6.0 are affected. These releases allow attackers to examine sensitive information through the Information Schema.
Risk and Exploitability
The CVSS base score of 2.7 indicates a low severity. The event is network‑based and requires a high privileged attacker with access via multiple protocol interfaces. The EPSS score is reported as <1%, indicating a very low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog, so the likelihood of exploitation remains uncertain; however the issue is described as easily exploitable, meaning that an attacker who can reach the server may use it to read protected data.
OpenCVE Enrichment