CVE-2025-24375 : Plain files scripts in mysql-operator
can lead to password leak
Summary:
Current method for calling a SQL DDL or python based mysql-shell scripts can leak database users credentials.
Details:
The method mysql-operator
calls mysql-shell application rely on writing to a temporary script file containing the full URI, with user and password. The file can be read by a unprivileged user during the operator runtime, due it being created with read permissions (0x644
). On other cases, when calling mysql cli, for one specific case when creating the operator users, the DDL contains said users credentials, which can be leak through the same mechanism of a temporary file.
Impact:
- Confidentiality: Compromise of database credentials.
- Affected Users: All users utilizing the
mysql-operator
machine and kubernetes operators
- Exploitation Prerequisites: Requires specific access to operator host.
Affected Versions:
All versions prior to revision 221 for kubernetes and revision 338 for machine operators.
Mitigation:
Users are advised to:
- Immediately update to version 221 or 338 (k8s and vm) or later, where this vulnerability has been addressed. Follow the upgrade guides for k8s and vm.
- Rotate any exposed credentials.
Resolution:
The vulnerability has been resolved in revision 221 (for k8s) and 338 (for machine), where the method for calling scripts was changed to not expose any credential.
References:
CVSS Score:
Low
CVE-2025-24375 : Plain files scripts in
mysql-operator
can lead to password leakSummary:
Current method for calling a SQL DDL or python based mysql-shell scripts can leak database users credentials.
Details:
The method
mysql-operator
calls mysql-shell application rely on writing to a temporary script file containing the full URI, with user and password. The file can be read by a unprivileged user during the operator runtime, due it being created with read permissions (0x644
). On other cases, when calling mysql cli, for one specific case when creating the operator users, the DDL contains said users credentials, which can be leak through the same mechanism of a temporary file.Impact:
mysql-operator
machine and kubernetes operatorsAffected Versions:
All versions prior to revision 221 for kubernetes and revision 338 for machine operators.
Mitigation:
Users are advised to:
Resolution:
The vulnerability has been resolved in revision 221 (for k8s) and 338 (for machine), where the method for calling scripts was changed to not expose any credential.
References:
CVSS Score:
Low