CVE-2026-25212
CRITICAL
9,9
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: changed
Confidentiality: high
Integrity: high
Availability: high
Description
AI Translation Available
An issue was discovered in Percona PMM before 3.7. Because an internal database user retains specific superuser privileges, an attacker with pmm-admin rights can abuse the 'Add data source' feature to break out of the database context and execute shell commands on the underlying operating system.
250
Execution with Unnecessary Privileges
DraftCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Availability
Access Control
Potential Impacts:
Gain Privileges Or Assume Identity
Execute Unauthorized Code Or Commands
Read Application Data
Dos: Crash, Exit, Or Restart
Applicable Platforms
Technologies:
Mobile
https://docs.percona.com/percona-monitoring-and-management/3/release-notes/3.7.…
https://percona.com