Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

MariaDB mariadb-dump Utility Can Be Hacked Remotely

OESA-2026-1538
Summary

A security update is available for MariaDB to fix a vulnerability in its dump utility that could allow attackers to run malicious code on a vulnerable server. This could happen if a user with access to the database uses the dump utility and an attacker tricks them into doing something that allows the attack to happen. To stay safe, make sure to apply the security update as soon as possible.

What to do
  • Update mariadb to version 10.5.29-3.oe2403sp1.
Affected software
VendorProductAffected versionsFix available
– mariadb <= 10.5.29-3.oe2403sp1 10.5.29-3.oe2403sp1
Original title
mariadb security update
Original description
MariaDB is a community developed fork from MySQL - a multi-user, multi-threaded
SQL database server. It is a client/server implementation consisting of
a server daemon (mariadbd) and many different client programs and libraries.
The base package contains the standard MariaDB/MySQL client programs and
utilities.

Security Fix(es):

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.(CVE-2025-13699)
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026