Impact
Oracle MySQL Shell versions 8.0.0‑8.0.45, 8.4.0‑8.4.8, and 9.0.0‑9.6.0 contain a defect in the Shell Core Client that can be triggered by a high‑privileged attacker who already has network access. While the vulnerability is difficult to exploit, a successful attack enables the attacker to obtain unauthorized access to all data that the Shell can reach, effectively compromising confidentiality of any MySQL data exposed through these interfaces.
Affected Systems
The affected products are Oracle Corporation’s MySQL Shell. Vulnerable releases span the 8.0.x, 8.4.x, and 9.0.x series as specified above.
Risk and Exploitability
The CVSS v3.1 base score of 5.8 reflects a moderate confidentiality impact, and the vulnerability is not currently listed in the CISA KEV catalog. The lack of an EPSS score implies no publicly reported exploitation yet, but the possibility of a scope change means other related components could also be impacted if the Shell is used as a gateway. The attack requires high privileges on the host system and network connectivity to the Shell, so restricting external access and enforcing strong authentication can reduce the likelihood of exploitation.
OpenCVE Enrichment