Impact
An information‑schema component flaw in Oracle MySQL Server allows an attacker with low privileges and network reach to read data that the server makes available. The weakness is an access control issue that lets a user bypass safeguards and retrieve non‑critical informational data, thus lowering confidentiality. The vulnerability is categorized under CWE-200 (Information Exposure) and CWE-201 (Improper Authorization).
Affected Systems
Oracle MySQL Server releases 8.0.0 through 8.0.45, 8.4.0 through 8.4.8, and 9.0.0 through 9.6.0 are affected. Any deployment using these versions on a network that permits MySQL protocol traffic is at risk.
Risk and Exploitability
The CVSS v3.1 base score of 4.3 indicates a moderate confidentiality impact. The EPSS score is reported as less than 1 %, implying that exploitation is unlikely but not impossible. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is via the network, through standard MySQL protocols, and an attacker only needs basic network access and a low‑privilege account to read sensitive data. No local privileges or user interaction are required, so the risk remains moderate for exposed installations.
OpenCVE Enrichment