Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Published: 2026-04-21
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A flaw in the JSON handling module of Oracle MySQL Server allows a low-privileged attacker with network connectivity to send malformed JSON data that forces the server to hang or crash repeatedly, causing a denial-of-service. The weakness is one of resource exhaustion, allowing the attacker to repeatedly consume server resources until the instance becomes unresponsive. The associated CVSS vector confirms a high impact on availability with no compromise of confidentiality or integrity.

Affected Systems

Oracle Corporation’s MySQL Server product is affected. Version ranges include 8.0.0 through 8.0.45, 8.4.0 through 8.4.8, and 9.0.0 through 9.6.0. All installations that use the JSON module within these release ranges are at risk.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity vulnerability, and the lack of an EPSS score or KEV listing implies there are currently no widespread exploit observations. However, the vulnerability can be triggered over any public or private network protocol supported by MySQL, meaning that any host exposed to the service is a potential target. Attackers require only network access and a basic credential or even anonymous connection depending on the configuration, making the threat realistic in many environments.

Generated by OpenCVE AI on April 22, 2026 at 08:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the security patch released in the Oracle CPU Apr 2026 advisory to all affected MySQL Server instances.
  • After applying the patch, restart the MySQL Server and verify that the JSON module starts correctly.
  • Restrict MySQL network access to trusted hosts or networks until all systems are fully patched and verified.

Generated by OpenCVE AI on April 22, 2026 at 08:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Title Denial of Service via Malformed JSON in MySQL Server
Weaknesses CWE-400
CWE-770

Wed, 22 Apr 2026 07:00:00 +0000

Type Values Removed Values Added
Title Denial of Service in MySQL Server via JSON Component
Weaknesses CWE-400
CWE-770

Wed, 22 Apr 2026 02:45:00 +0000

Type Values Removed Values Added
Title Denial of Service in MySQL Server via JSON Component
Weaknesses CWE-400
CWE-770

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON). Supported versions that are affected are 8.0.0-8.0.45, 8.4.0-8.4.8 and 9.0.0-9.6.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
First Time appeared Oracle
Oracle mysql Server
CPEs cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
Vendors & Products Oracle
Oracle mysql Server
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Oracle Mysql Server
cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2026-04-21T20:35:35.513Z

Reserved: 2026-03-26T19:48:45.679Z

Link: CVE-2026-34308

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-21T21:16:36.253

Modified: 2026-04-21T21:16:36.253

Link: CVE-2026-34308

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T08:30:12Z

Weaknesses