9.5.1
CVE-2018-25231 describes a denial-of-service (DoS) vulnerability discovered in HeidiSQL. This flaw allows a local attacker to crash the application by exploiting the SQL log file path field within the logging preferences. The vulnerability impacts versions 9.5.0.5196 through 9.5.0.5196, and a patch is available to resolve the issue.
An attacker exploiting this vulnerability can trigger a denial-of-service condition, effectively crashing the HeidiSQL application. This disruption can prevent legitimate users from accessing and managing their databases. The attack involves supplying an excessively long file path in the SQL log file path field, leading to a buffer overflow. While the vulnerability is local, it could be leveraged by an attacker who has already gained some level of access to the system running HeidiSQL. The impact is primarily focused on application availability and potential data access disruption if the application is critical for database management.
CVE-2018-25231 is not listed on the CISA KEV catalog. Public proof-of-concept exploits are not widely available, suggesting a low probability of widespread exploitation. The vulnerability was publicly disclosed on 2026-03-30. Given the local nature of the vulnerability and the lack of readily available exploits, the immediate risk is considered relatively low.
Exploit Status
EPSS
0.01% (3% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2018-25231 is to upgrade to a patched version of HeidiSQL. Unfortunately, a specific fixed version is not provided in the CVE details. As a temporary workaround, consider limiting the length of file paths entered into the SQL log file path field in Preferences > Logging. While not a complete solution, this can reduce the likelihood of triggering the buffer overflow. Monitor system logs for unexpected application crashes or errors related to file path handling. After upgrading, confirm the fix by attempting to enter an excessively long file path in the logging preferences and verifying that the application does not crash.
Update HeidiSQL to a version later than 9.5.0.5196. This will prevent a local attacker from causing a denial of service by providing an excessively long file path in the logging preferences.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2018-25231 is a denial-of-service vulnerability in HeidiSQL versions 9.5.0.5196–9.5.0.5196, allowing local attackers to crash the application by providing a long file path.
You are affected if you are using HeidiSQL versions 9.5.0.5196–9.5.0.5196 and have not upgraded to a patched version.
Upgrade to a patched version of HeidiSQL. As a temporary workaround, limit the length of file paths entered in the logging preferences.
There is no widespread evidence of active exploitation of CVE-2018-25231 at this time.
Refer to the HeidiSQL website and relevant security forums for updates and advisories related to CVE-2018-25231.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.