CVE-2025-8715 Read Assessment Updated: 2025/08/14PostgreSQL pg_dump newline in object name executes arbitrary code in psql client and in restore target server All versions of Postgresql prior to 17.6, 16.10, 15.14, 14.19, 13.22 3.x, EDB Postgres Extended Server prior to 17.6.0, 16.10.0, 15.14.0, 14.19.0, 13.22 , EDB Postgres Advanced Server prior to 17.6.0, 16.10.0, 15.14.0, 14.19.0, 13.22
Summary: Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore target server. pg_dumpall, pg_restore, and pg_upgrade are also affected. Read More... |
CVE-2025-8714 Read Assessment Updated: 2025/08/14PostgreSQL pg_dump lets superuser of origin server execute arbitrary code in psql client All versions of Postgresql prior to 17.6, 16.10, 15.14, 14.19, 13.22 3.x, EDB Postgres Extended Server prior to 17.6.0, 16.10.0, 15.14.0, 14.19.0, 13.22 , EDB Postgres Advanced Server prior to 17.6.0, 16.10.0, 15.14.0, 14.19.0, 13.22
Summary: Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands. pg_dumpall is also affected. pg_restore is affected when used to generate a plain-format dump. This is similar to MySQL CVE-2024-21096 Read More... |
CVE-2025-46801 Read Assessment Updated: 2025/07/04Pgpool-II Authentication Bypass All versions of EDB Pool prior to 4.5.1-4, PGPool-II versions prior to 4.6.1, 4.5.7, 4.4.12, 4.3.15, and 4.2.22
Summary: Pgpool-II contains an authentication bypass vulnerability that can be exploited under certain conditions. If an attacker exploits the vulnerability they may be able to log in to the system as an arbitrary user, which could allow them to read or tamper with data in the database, and/or disable the database. Read More... |
CVE-2025-2291 Read Assessment Updated: 2025/04/30PgBouncer "VALID UNTIL yesterday" All versions of PGBouncer prior to 1.24.1, TPA prior to 23.38.0, PGAI Cloud Service prior to May 12, 2025
Summary: In PgBouncer, the auth_query mechanism does not consider the VALID UNTIL attribute set in PostgreSQL for user passwords. This oversight allows users to authenticate using expired passwords, potentially granting unauthorized access. The flaw was fixed in [PgBouncer 1.24.1](https://www.pgbouncer.org/changelog.html#pgbouncer-124x). Read More... |
CVE-2025-1094 Read Assessment Updated: 2025/02/15PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation All versions of PostgreSQL, EPAS and PGE prior to 17.3, 16.7, 15.11, 14.16, and 13.19
Summary: Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral() , PQescapeIdentifier() , PQescapeString() , and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns. Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal. Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL . Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected. Read More... |