CVE-2025-12967
November 10, 2025
An issue in AWS Wrappers for Amazon Aurora PostgreSQL may allow for privilege escalation to rds_superuser role. A low privilege authenticated user can create a crafted function that could be executed with permissions of other Amazon Relational Database Service (RDS) users.
We recommend customers upgrade to the following versions: AWS JDBC Wrapper to v2.6.5, AWS Go Wrapper to 2025-10-17, AWS NodeJS Wrapper to v2.0.1, AWS Python Wrapper to v1.4.0 and AWS PGSQL ODBC driver to v1.0.1
Affected Packages
https://github.com/aws/aws-advanced-go-wrapper.git (GITHUB):
Affected version(s) >=awssql/v1.0.0 <awssql/v1.1.1Fix Suggestion:
Update to version awssql/v1.1.1https://github.com/aws/aws-pgsql-odbc.git (GITHUB):
Affected version(s) =1.0.0 <1.0.1Fix Suggestion:
Update to version 1.0.1https://github.com/aws/aws-advanced-nodejs-wrapper.git (GITHUB):
Affected version(s) >=1.0.0 <2.0.1Fix Suggestion:
Update to version 2.0.1https://github.com/aws/aws-advanced-jdbc-wrapper.git (GITHUB):
Affected version(s) >=0.1.0 <2.6.5Fix Suggestion:
Update to version 2.6.5https://github.com/aws/aws-advanced-python-wrapper.git (GITHUB):
Affected version(s) >=1.0.0 <1.4.0Fix Suggestion:
Update to version 1.4.0github.com/aws/aws-advanced-go-wrapper (GO):
Affected version(s) >=v0.0.0-20250730171410-a7fe13ad660f <v0.0.0-20251017102223-8a8ba4036f43Fix Suggestion:
Update to version v0.0.0-20251017102223-8a8ba4036f43software.amazon.jdbc:aws-advanced-jdbc-wrapper (JAVA):
Affected version(s) >=1.0.0 <2.6.5Fix Suggestion:
Update to version 2.6.5aws-advanced-nodejs-wrapper (NPM):
Affected version(s) >=1.0.0 <2.0.1Fix Suggestion:
Update to version 2.0.1aws_advanced_python_wrapper (PYTHON):
Affected version(s) >=1.0.0 <1.4.0Fix Suggestion:
Update to version 1.4.0aws-advanced-python-wrapper (PYTHON):
Affected version(s) >=1.0.0 <1.4.0Fix Suggestion:
Update to version 1.4.0Related ResourcesĀ (15)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.6
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
PASSIVE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
8
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
EPSS
Base Score:
0.18