We found results for “”
CVE-2025-46801
Good to know:
Date: May 19, 2025
Pgpool-II provided by PgPool Global Development Group contains an authentication bypass by primary weakness vulnerability. if the vulnerability is exploited, an attacker may be able to log in to the system as an arbitrary user, allowing them to read or tamper with data in the database, and/or disable the database.
Severity Score
Severity Score
Weakness Type (CWE)
Authentication Bypass by Primary Weakness
CWE-305Top Fix
Upgrade Version
Upgrade to version https://github.com/pgpool/pgpool2.git - V4_5_7;https://github.com/pgpool/pgpool2.git - V4_6_1;https://github.com/pgpool/pgpool2.git - V4_4_12;https://github.com/pgpool/pgpool2.git - V4_3_15;https://github.com/pgpool/pgpool2.git - V4_2_22
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


