CVE-2025-62611

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-62611
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62611.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-62611
Aliases
Downstream
Published
2025-10-22T19:29:26Z
Modified
2025-10-24T03:49:43.008257Z
Severity
  • 8.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
aiomysql allows arbitrary access to client files through vulnerability of a malicious MySQL server
Details

aiomysql is a library for accessing a MySQL database from the asyncio. Prior to version 0.3.0, the client-side settings are not checked before sending local files to MySQL server, which allows obtaining arbitrary files from the client using a rogue server. It is possible to create a rogue MySQL server that emulates authorization, ignores client flags and requests arbitrary files from the client by sending a LOAD_LOCAL instruction packet. This issue has been patched in version 0.3.0.

Database specific
{
    "cwe_ids": [
        "CWE-73"
    ]
}
References

Affected packages

Git / github.com/aio-libs/aiomysql

Affected ranges

Type
GIT
Repo
https://github.com/aio-libs/aiomysql
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.0.7

v0.*

v0.0.1
v0.0.12
v0.0.13
v0.0.14
v0.0.15
v0.0.16
v0.0.17
v0.0.18
v0.0.19
v0.0.2
v0.0.20
v0.0.21
v0.0.22
v0.0.3
v0.0.4
v0.0.5
v0.0.6
v0.0.7
v0.0.8
v0.0.9
v0.1.0
v0.1.0rc1
v0.1.0rc2
v0.1.1
v0.2.0