CVE-2025-13699
Description
MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation.
The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A directory traversal vulnerability in MariaDB's mariadb-dump utility allows remote code execution via improper validation of view names.
Vulnerability
Details
The vulnerability resides in the mariadb-dump utility, specifically in how it handles view names during file operations. The flaw is a directory traversal issue caused by the lack of proper validation of user-supplied paths before using paths. This allows an attacker to manipulate file paths, potentially leading to arbitrary file writes or reads [1].
Exploitation
Exploitation requires user interaction with the mariadb-dump utility, though attack vectors may vary depending on the implementation. An attacker could craft a malicious database view name that, when processed by mariadb-dump, triggers a path traversal. This could be achieved by enticing a user to run mariadb-dump on a database containing such a view, or through other means that involve the utility processing untrusted input [1].
Impact
Successful exploitation allows an attacker to execute arbitrary code in the context of the current user. This could lead to unauthorized access, data exfiltration, or further compromise of the system [1].
Mitigation
The issue is tracked as MDEV-37483 and has been addressed in MariaDB versions 10.6, 10.11, 11.4, and 11.8. Users are advised to update to the latest patched versions to mitigate the risk [2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.