We found results for “”
CVE-2025-62611
Good to know:
Date: October 22, 2025
aiomysql is a library for accessing a MySQL database from the asyncio. Prior to version 0.3.0, the client-side settings are not checked before sending local files to MySQL server, which allows obtaining arbitrary files from the client using a rogue server. It is possible to create a rogue MySQL server that emulates authorization, ignores client flags and requests arbitrary files from the client by sending a LOAD_LOCAL instruction packet. This issue has been patched in version 0.3.0.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
External Control of File Name or Path
CWE-73Top Fix
Upgrade Version
Upgrade to version aiomysql - 0.3.0;aiomysql - 0.3.0;https://github.com/aio-libs/aiomysql.git - v0.3.2
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


