icon

We found results for “

CVE-2025-8714

Good to know:

icon

Date: August 14, 2025

Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands. pg_dumpall is also affected. pg_restore is affected when used to generate a plain-format dump. This is similar to MySQL CVE-2024-21096. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.

Severity Score

Severity Score

Weakness Type (CWE)

Inclusion of Functionality from Untrusted Control Sphere

CWE-829

Top Fix

icon

Upgrade Version

Upgrade to version https://github.com/postgres/postgres.git - REL_13_22;https://github.com/postgres/postgres.git - REL_14_19;https://github.com/postgres/postgres.git - REL_15_14;https://github.com/postgres/postgres.git - REL_16_10;https://github.com/postgres/postgres.git - REL_17_6

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us