CVE-2025-24375

MySQL K8s charm could leak credentials for root-level user `serverconfig`

Description

Charmed MySQL K8s operator is a Charmed Operator for running MySQL on Kubernetes. Before revision 221, the method for calling a SQL DDL or python based mysql-shell scripts can leak database users credentials. The method mysql-operator calls mysql-shell application rely on writing to a temporary script file containing the full URI, with user and password. The file can be read by a unprivileged user during the operator runtime, due it being created with read permissions (0x644). On other cases, when calling mysql cli, for one specific case when creating the operator users, the DDL contains said users credentials, which can be leak through the same mechanism of a temporary file. All versions prior to revision 221 for kubernetes and revision 338 for machine operators.

Category

5.0
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.01%
Affected: canonical mysql-k8s-operator
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-24375?
CVE-2025-24375 has been scored as a medium severity vulnerability.
How to fix CVE-2025-24375?
To fix CVE-2025-24375, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-24375 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-24375 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-24375?
CVE-2025-24375 affects canonical mysql-k8s-operator.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.