Description
The DataRow.Decode function fails to properly validate field lengths. A malicious or compromised PostgreSQL server can send a DataRow message with a negative field length, causing a slice bounds out of range panic.
Published: 2026-03-26
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

The vulnerability lies in the DataRow.Decode function of the pgproto3 library. It fails to validate field lengths, allowing a malicious PostgreSQL server to send a DataRow message with a negative field length. The library does not check this value, causing a slice bounds error that triggers a panic and crashes the consuming application. This results in a denial of service for the affected process. The weakness corresponds to CWE‑1285, which indicates improper handling of array bounds or indices.

Affected Systems

Any application that incorporates the github.com/jackc/pgproto3/v2 library is at risk, including projects that depend on this library such as pgx. All releases prior to the official fix are potentially vulnerable, as the CVE entry does not supply specific version ranges.

Risk and Exploitability

The CVSS score of 7.5 indicates high impact, yet the EPSS score of less than 1% suggests that exploitation is presently unlikely and it is not listed in the CISA KEV catalog. The attack vector is remote via the PostgreSQL server side; an attacker who can control or compromise a PostgreSQL instance can send the malicious DataRow message. No special client‑side privileges are required, though the vulnerable client must accept the connection. Consequently, systems that accept connections from untrusted databases should treat this as sufficiently risky to justify prompt remediation.

Generated by OpenCVE AI on March 28, 2026 at 13:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the pgproto3 library to the latest patched release from its GitHub repository.
  • Verify your dependency lock files (e.g., go.mod and go.sum) to ensure the vulnerable version is not in use.
  • If the patch cannot be applied immediately, isolate the affected services, monitor for panic crashes, and restrict traffic from untrusted PostgreSQL servers via firewall rules or network segmentation.

Generated by OpenCVE AI on March 28, 2026 at 13:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jqcq-xjh3-6g23 Denial of service in github.com/jackc/pgproto3/v2
History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
References

Mon, 30 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1285
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Important


Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Jackc
Jackc pgproto3
Vendors & Products Jackc
Jackc pgproto3

Thu, 26 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description The DataRow.Decode function fails to properly validate field lengths. A malicious or compromised PostgreSQL server can send a DataRow message with a negative field length, causing a slice bounds out of range panic.
Title Denial of service in github.com/jackc/pgproto3/v2
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-04-02T19:08:53.981Z

Reserved: 2026-03-11T16:38:46.556Z

Link: CVE-2026-32286

cve-icon Vulnrichment

Updated: 2026-03-30T14:08:56.643Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-03-26T20:16:12.303

Modified: 2026-04-02T20:16:23.443

Link: CVE-2026-32286

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-26T19:40:51Z

Links: CVE-2026-32286 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:27:51Z

Weaknesses