CVE-2026-32710
Published: 20 March 2026
Description
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Security Summary
CVE-2026-32710 is a heap-based buffer overflow vulnerability (CWE-122) in the JSON_SCHEMA_VALID() function of MariaDB server, a community-developed fork of MySQL server. It affects MariaDB versions 11.4 prior to 11.4.10 and 11.8 prior to 11.8.6. An authenticated user can trigger the issue, leading to a server crash. The vulnerability carries a CVSS v3.1 base score of 8.5 (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H), reflecting high impact potential despite elevated attack complexity.
An attacker with low-privilege authenticated access over the network can exploit this vulnerability by invoking the flawed JSON_SCHEMA_VALID() function, causing a denial-of-service via server crash. Under specific conditions requiring precise control over memory layout—typically feasible only in controlled lab environments—the crash could potentially escalate to remote code execution, granting high confidentiality, integrity, and availability impacts with a scope change.
MariaDB has addressed the issue in versions 11.4.10, 11.8.6, and 12.2.2. Official advisories, including the GitHub Security Advisory at https://github.com/MariaDB/server/security/advisories/GHSA-4rj5-2227-9wgc and the Jira ticket at https://jira.mariadb.org/browse/MDEV-38356, recommend upgrading to these patched releases as the primary mitigation.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Authenticated remote exploitation of heap buffer overflow in MariaDB server enables DoS via crash (T1499.004), potential RCE for privilege escalation (T1068), via remote service exploitation (T1210).