VYPR
High severity7.0NVD Advisory· Published Dec 23, 2025· Updated Apr 15, 2026

CVE-2025-13699

CVE-2025-13699

Description

MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A directory traversal vulnerability in MariaDB's mariadb-dump utility allows remote code execution via improper validation of view names.

Vulnerability

Details

The vulnerability resides in the mariadb-dump utility, specifically in how it handles view names during file operations. The flaw is a directory traversal issue caused by the lack of proper validation of user-supplied paths before using paths. This allows an attacker to manipulate file paths, potentially leading to arbitrary file writes or reads [1].

Exploitation

Exploitation requires user interaction with the mariadb-dump utility, though attack vectors may vary depending on the implementation. An attacker could craft a malicious database view name that, when processed by mariadb-dump, triggers a path traversal. This could be achieved by enticing a user to run mariadb-dump on a database containing such a view, or through other means that involve the utility processing untrusted input [1].

Impact

Successful exploitation allows an attacker to execute arbitrary code in the context of the current user. This could lead to unauthorized access, data exfiltration, or further compromise of the system [1].

Mitigation

The issue is tracked as MDEV-37483 and has been addressed in MariaDB versions 10.6, 10.11, 11.4, and 11.8. Users are advised to update to the latest patched versions to mitigate the risk [2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.