Untrusted Data Inclusion in PostgreSQL Affects Multiple Versions
CVE-2025-8714

8.8HIGH

Key Information:

Vendor

PostgreSQL

Vendor
CVE Published:
14 August 2025

What is CVE-2025-8714?

CVE-2025-8714 is a significant vulnerability affecting multiple versions of PostgreSQL, an open-source relational database management system widely used for managing large datasets and applications. This vulnerability arises from an issue with untrusted data inclusion in the pg_dump utility, which could enable a malicious superuser on the origin server to inject arbitrary code that would execute at restore time under the privileges of the client operating system account. The affected components include pg_dump, pg_dumpall, and, in certain contexts, pg_restore when it generates plain-format dumps. Versions prior to PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are particularly vulnerable, posing a serious threat to data integrity and security. If exploited, this vulnerability could allow attackers to execute arbitrary code, leading to unauthorized actions on the database and potential data corruption or loss.

Potential impact of CVE-2025-8714

  1. Arbitrary Code Execution: The vulnerability allows attackers to execute arbitrary code on the client system, potentially leading to full system compromise if the executing process has sufficient privileges.

  2. Data Integrity Risks: Unauthorized code execution could result in data manipulation or corruption, undermining the accuracy and reliability of the stored information, which can have serious implications for business operations and decision-making.

  3. Elevated Attack Surface: With the potential for code injection during the restore process, the vulnerability expands the attack vector for malicious actors, increasing the risk of further exploitation within the organization's infrastructure and data systems.

Affected Version(s)

PostgreSQL 17 < 17.6

PostgreSQL 16 < 16.10

PostgreSQL 15 < 15.14

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

The PostgreSQL project thanks Martin Rakhmanov, Matthieu Denais, and RyotaK for reporting this problem.
.