Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4273-1 | postgresql-13 security update |
EUVD |
EUVD-2025-24809 | Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore target server. pg_dumpall, pg_restore, and pg_upgrade are also affected. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. Versions before 11.20 are unaffected. CVE-2012-0868 had fixed this class of problem, but version 11.20 reintroduced it. |
Ubuntu USN |
USN-7741-1 | PostgreSQL vulnerabilities |
Solution
No solution given by the vendor.
Workaround
To block attacks against the psql client, use "pg_restore --dbname" instead of restore methods that involve "psql". To block SQL injection against the restore target server, revoke the CREATE permission from non-superusers at the origin server.
Fri, 15 Aug 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Postgresql
Postgresql postgresql |
|
| Vendors & Products |
Postgresql
Postgresql postgresql |
Fri, 15 Aug 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 14 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 Aug 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore target server. pg_dumpall, pg_restore, and pg_upgrade are also affected. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. Versions before 11.20 are unaffected. CVE-2012-0868 had fixed this class of problem, but version 11.20 reintroduced it. | |
| Title | PostgreSQL pg_dump newline in object name executes arbitrary code in psql client and in restore target server | |
| Weaknesses | CWE-93 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: PostgreSQL
Published:
Updated: 2025-08-15T03:55:56.953Z
Reserved: 2025-08-07T16:39:47.692Z
Link: CVE-2025-8715
Updated: 2025-08-14T19:55:36.722Z
Status : Awaiting Analysis
Published: 2025-08-14T13:15:37.880
Modified: 2025-08-15T13:13:07.817
Link: CVE-2025-8715
OpenCVE Enrichment
Updated: 2025-08-15T08:17:36Z
Debian DLA
EUVD
Ubuntu USN