-
Notifications
You must be signed in to change notification settings - Fork 1
Description
Vulnerable Library - mysql-connector-j-9.2.0.jar
JDBC Type 4 driver for MySQL.
Library home page: http://dev.mysql.com/doc/connector-j/en/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/com.mysql/mysql-connector-j/9.2.0/cc7bed59ccee3c47554aeb89e37c24d95a74bec3/mysql-connector-j-9.2.0.jar
Found in HEAD commit: 8d94d374be07cfa4928fc28391f49c0f326baeae
Vulnerabilities
Vulnerability | Severity | Dependency | Type | Fixed in (mysql-connector-j version) | Remediation Possible** | |
---|---|---|---|---|---|---|
CVE-2025-30706 | 7.5 | mysql-connector-j-9.2.0.jar | Direct | 9.3.0 | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2025-30706
Vulnerable Library - mysql-connector-j-9.2.0.jar
JDBC Type 4 driver for MySQL.
Library home page: http://dev.mysql.com/doc/connector-j/en/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/com.mysql/mysql-connector-j/9.2.0/cc7bed59ccee3c47554aeb89e37c24d95a74bec3/mysql-connector-j-9.2.0.jar
Dependency Hierarchy:
- ❌ mysql-connector-j-9.2.0.jar (Vulnerable Library)
Found in HEAD commit: 8d94d374be07cfa4928fc28391f49c0f326baeae
Found in base branch: master
Vulnerability Details
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
Publish Date: 2025-04-15
URL: CVE-2025-30706
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://www.oracle.com/security-alerts/cpuapr2025.html
Release Date: 2025-04-15
Fix Resolution: 9.3.0
Step up your Open Source Security Game with Mend here