-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Vulnerable Library - mysql-connector-j-9.2.0.jar
JDBC Type 4 driver for MySQL.
Library home page: http://dev.mysql.com/doc/connector-j/en/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/com.mysql/mysql-connector-j/9.2.0/cc7bed59ccee3c47554aeb89e37c24d95a74bec3/mysql-connector-j-9.2.0.jar
Found in HEAD commit: 2f1a9a9570f4eb6dd31214d496a58b9a9f7e7718
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (mysql-connector-j version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2025-30706 | 7.5 | mysql-connector-j-9.2.0.jar | Direct | 9.3.0 | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2025-30706
Vulnerable Library - mysql-connector-j-9.2.0.jar
JDBC Type 4 driver for MySQL.
Library home page: http://dev.mysql.com/doc/connector-j/en/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/com.mysql/mysql-connector-j/9.2.0/cc7bed59ccee3c47554aeb89e37c24d95a74bec3/mysql-connector-j-9.2.0.jar
Dependency Hierarchy:
- ❌ mysql-connector-j-9.2.0.jar (Vulnerable Library)
Found in HEAD commit: 2f1a9a9570f4eb6dd31214d496a58b9a9f7e7718
Found in base branch: master
Vulnerability Details
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
Publish Date: 2025-04-15
URL: CVE-2025-30706
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://www.oracle.com/security-alerts/cpuapr2025.html
Release Date: 2025-04-15
Fix Resolution: 9.3.0
Step up your Open Source Security Game with Mend here