{"schema_version":"1.7.2","id":"OESA-2025-2675","modified":"2025-11-14T12:39:03Z","published":"2025-11-14T12:39:03Z","upstream":["CVE-2025-62611"],"summary":"python-aiomysql security update","details":"**aiomysql** is a &amp;quot;driver&amp;quot; for accessing a `MySQL` database from the asyncio_ (PEP-3156/tulip) framework. It depends on and reuses most parts of PyMySQL_ . *aiomysql* tries to be like awesome aiopg_ library and preserve same api, look and feel.\r\n\r\nSecurity Fix(es):\n\naiomysql is a library for accessing a MySQL database from the asyncio. Prior to version 0.3.0, the client-side settings are not checked before sending local files to MySQL server, which allows obtaining arbitrary files from the client using a rogue server. It is possible to create a rogue MySQL server that emulates authorization, ignores client flags and requests arbitrary files from the client by sending a LOAD_LOCAL instruction packet. This issue has been patched in version 0.3.0.(CVE-2025-62611)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"python-aiomysql","purl":"pkg:rpm/openEuler/python-aiomysql&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.2.0-2.oe2403"}]}],"ecosystem_specific":{"noarch":["python-aiomysql-help-0.2.0-2.oe2403.noarch.rpm","python3-aiomysql-0.2.0-2.oe2403.noarch.rpm"],"src":["python-aiomysql-0.2.0-2.oe2403.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2675"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-62611"}],"database_specific":{"severity":"High"}}
