Description
SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to obtain sensitive information via the to_postgis()` function being used to write GeoDataFrames to a PostgreSQL database.
Published: 2026-01-30
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Immediate Patch
AI Analysis

Impact

Geopandas, an open‑source Python library for geospatial data, contains a flaw in its to_postgis() function that allows an attacker to inject arbitrary SQL when writing GeoDataFrames to a PostgreSQL database. The vulnerability is a classic input validation failure (CWE‑89) and permits a malicious actor to obtain data that the database had stored, potentially leaking sensitive geospatial records. The CVE description does not state that destructive writes are possible, so the impact is limited to unauthorized read access as described.

Affected Systems

Any installation of geopandas older than version 1.1.2 that uses the to_postgis() routine to persist data into PostgreSQL is affected. The impact is confined to environments where geopandas is executed with code that can influence the arguments passed to the function—such as custom scripts, data pipelines, or web services that expose data ingestion endpoints.

Risk and Exploitability

The vulnerability has a CVSS score of 8.6, indicating high severity. The EPSS score is reported as less than 1%, suggesting a low likelihood of exploitation under normal circumstances, and it is not listed in the CISA KEV catalog. While the exploit requires some level of code execution or data injection capability, the most likely pathway is through local code that utilizes to_postgis(); in shared or public services, an attacker could supply crafted data that is then written to the database. The risk is primarily the potential exposure of confidential geospatial content rather than denial of service or integrity loss.

Generated by OpenCVE AI on April 22, 2026 at 12:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade geopandas to version 1.1.2 or later to eliminate the SQL injection flaw.
  • Sanitize or validate all data passed to to_postgis, ensuring that only safe, parameterized inputs reach the database layer.
  • Configure the PostgreSQL user used by geopandas to have the minimal privileges necessary—ideally only INSERT and SELECT on the target tables—and monitor database logs for unexpected activity.

Generated by OpenCVE AI on April 22, 2026 at 12:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4523-1 python-geopandas security update
Github GHSA Github GHSA GHSA-6497-prx7-gpmq geopandas SQL Injection Vulnerability in to_postgis() Allows Information Disclosure
Ubuntu USN Ubuntu USN USN-8083-1 GeoPandas vulnerability
History

Wed, 22 Apr 2026 12:30:00 +0000

Type Values Removed Values Added
Title Unauthorized SQL Injection via geopandas to_postgis()

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
References

Wed, 11 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:geopandas:geopandas:*:*:*:*:*:python:*:*

Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Geopandas
Geopandas geopandas
Vendors & Products Geopandas
Geopandas geopandas

Fri, 30 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to obtain sensitive information via the to_postgis()` function being used to write GeoDataFrames to a PostgreSQL database.
References

Subscriptions

Geopandas Geopandas
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-21T18:22:26.627Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-69662

cve-icon Vulnrichment

Updated: 2026-04-21T18:22:26.627Z

cve-icon NVD

Status : Modified

Published: 2026-01-30T19:16:11.967

Modified: 2026-04-21T19:16:16.373

Link: CVE-2025-69662

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:15:16Z

Weaknesses