{"api_version":"1","generated_at":"2026-04-23T03:26:16+00:00","cve":"CVE-2022-2625","urls":{"html":"https://cve.report/CVE-2022-2625","api":"https://cve.report/api/cve/CVE-2022-2625.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-2625","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-2625"},"summary":{"title":"CVE-2022-2625","description":"A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2022-08-18 19:15:00","updated_at":"2022-12-02 20:14:00"},"problem_types":["CWE-1321"],"metrics":[],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2022-2625","name":"https://access.redhat.com/security/cve/CVE-2022-2625","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202211-04","name":"GLSA-202211-04","refsource":"GENTOO","tags":[],"title":"PostgreSQL: Multiple Vulnerabilities (GLSA 202211-04) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/","name":"https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/","refsource":"MISC","tags":[],"title":"PostgreSQL: PostgreSQL 14.5, 13.8, 12.12, 11.17, 10.22, and 15 Beta 3 Released!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2113825","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2113825","refsource":"MISC","tags":[],"title":"2113825 – (CVE-2022-2625) CVE-2022-2625 postgresql: Extension scripts replace objects not belonging to the extension.","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-2625","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2625","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"2625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"2625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"postgresql","cpe5":"postgresql","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"2625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"postgresql","cpe5":"postgresql","cpe6":"15","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"2625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"postgresql","cpe5":"postgresql","cpe6":"15","cpe7":"beta2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"2625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"2625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"2625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"2625","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-2625","qid":"160187","title":"Oracle Enterprise Linux Security Update for postgresql:12 (ELSA-2022-7128)"},{"cve":"CVE-2022-2625","qid":"160394","title":"Oracle Enterprise Linux Security Update for postgresql:10 (ELSA-2023-0113)"},{"cve":"CVE-2022-2625","qid":"160532","title":"Oracle Enterprise Linux Security Update for postgresql:13 (ELSA-2023-1576)"},{"cve":"CVE-2022-2625","qid":"160543","title":"Oracle Enterprise Linux Security Update for postgresql (ELSA-2023-1693)"},{"cve":"CVE-2022-2625","qid":"180935","title":"Debian Security Update for postgresql-11 (DLA 3072-1)"},{"cve":"CVE-2022-2625","qid":"181141","title":"Debian Security Update for postgresql-13 (CVE-2022-2625)"},{"cve":"CVE-2022-2625","qid":"198904","title":"Ubuntu Security Notification for PostgreSQL Vulnerability (USN-5571-1)"},{"cve":"CVE-2022-2625","qid":"240781","title":"Red Hat Update for postgresql:12 (RHSA-2022:7128)"},{"cve":"CVE-2022-2625","qid":"241048","title":"Red Hat Update for postgresql:10 (RHSA-2023:0113)"},{"cve":"CVE-2022-2625","qid":"241062","title":"Red Hat Update for rh-postgresql10-postgresql (RHSA-2023:0160)"},{"cve":"CVE-2022-2625","qid":"241320","title":"Red Hat Update for postgresql:13 (RHSA-2023:1576)"},{"cve":"CVE-2022-2625","qid":"241338","title":"Red Hat Update for postgresql (RHSA-2023:1693)"},{"cve":"CVE-2022-2625","qid":"242527","title":"Red Hat Update for postgresql (RHSA-2023:7545)"},{"cve":"CVE-2022-2625","qid":"242534","title":"Red Hat Update for postgresql:13 (RHSA-2023:7580)"},{"cve":"CVE-2022-2625","qid":"242547","title":"Red Hat Update for postgresql:12 (RHSA-2023:7667)"},{"cve":"CVE-2022-2625","qid":"242550","title":"Red Hat Update for postgresql:13 (RHSA-2023:7695)"},{"cve":"CVE-2022-2625","qid":"242552","title":"Red Hat Update for postgresql:12 (RHSA-2023:7694)"},{"cve":"CVE-2022-2625","qid":"378413","title":"Alibaba Cloud Linux Security Update for postgresql:13 (ALINUX3-SA-2023:0036)"},{"cve":"CVE-2022-2625","qid":"502479","title":"Alpine Linux Security Update for postgresql"},{"cve":"CVE-2022-2625","qid":"502480","title":"Alpine Linux Security Update for postgresql13"},{"cve":"CVE-2022-2625","qid":"502481","title":"Alpine Linux Security Update for postgresql14"},{"cve":"CVE-2022-2625","qid":"502483","title":"Alpine Linux Security Update for postgresql12"},{"cve":"CVE-2022-2625","qid":"502780","title":"Alpine Linux Security Update for postgresql15"},{"cve":"CVE-2022-2625","qid":"503690","title":"Alpine Linux Security Update for postgresql13"},{"cve":"CVE-2022-2625","qid":"503691","title":"Alpine Linux Security Update for postgresql14"},{"cve":"CVE-2022-2625","qid":"503701","title":"Alpine Linux Security Update for postgresql12"},{"cve":"CVE-2022-2625","qid":"672421","title":"EulerOS Security Update for postgresql (EulerOS-SA-2022-2802)"},{"cve":"CVE-2022-2625","qid":"710683","title":"Gentoo Linux PostgreSQL Multiple Vulnerabilities (GLSA 202211-04)"},{"cve":"CVE-2022-2625","qid":"752505","title":"SUSE Enterprise Linux Security Update for postgresql10 (SUSE-SU-2022:2893-1)"},{"cve":"CVE-2022-2625","qid":"752511","title":"SUSE Enterprise Linux Security Update for postgresql13 (SUSE-SU-2022:2912-1)"},{"cve":"CVE-2022-2625","qid":"752514","title":"SUSE Enterprise Linux Security Update for postgresql10 (SUSE-SU-2022:2914-1)"},{"cve":"CVE-2022-2625","qid":"752522","title":"SUSE Enterprise Linux Security Update for postgresql10 (SUSE-SU-2022:2946-1)"},{"cve":"CVE-2022-2625","qid":"752529","title":"SUSE Enterprise Linux Security Update for postgresql12 (SUSE-SU-2022:2958-1)"},{"cve":"CVE-2022-2625","qid":"752533","title":"SUSE Enterprise Linux Security Update for postgresql12 (SUSE-SU-2022:2988-1)"},{"cve":"CVE-2022-2625","qid":"752534","title":"SUSE Enterprise Linux Security Update for postgresql13 (SUSE-SU-2022:2987-1)"},{"cve":"CVE-2022-2625","qid":"752535","title":"SUSE Enterprise Linux Security Update for postgresql14 (SUSE-SU-2022:2989-1)"},{"cve":"CVE-2022-2625","qid":"752568","title":"SUSE Enterprise Linux Security Update for postgresql12 (SUSE-SU-2022:3193-1)"},{"cve":"CVE-2022-2625","qid":"752586","title":"SUSE Enterprise Linux Security Update for postgresql14 (SUSE-SU-2022:3269-1)"},{"cve":"CVE-2022-2625","qid":"753240","title":"SUSE Enterprise Linux Security Update for postgresql14 (SUSE-SU-2022:2989-2)"},{"cve":"CVE-2022-2625","qid":"902769","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for postgresql (10600)"},{"cve":"CVE-2022-2625","qid":"902771","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for postgresql (10595)"},{"cve":"CVE-2022-2625","qid":"904136","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for postgresql (10595-1)"},{"cve":"CVE-2022-2625","qid":"904189","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for postgresql (10600-1)"},{"cve":"CVE-2022-2625","qid":"940729","title":"AlmaLinux Security Update for postgresql:12 (ALSA-2022:7128)"},{"cve":"CVE-2022-2625","qid":"940882","title":"AlmaLinux Security Update for postgresql:10 (ALSA-2023:0113)"},{"cve":"CVE-2022-2625","qid":"940968","title":"AlmaLinux Security Update for postgresql:13 (ALSA-2023:1576)"},{"cve":"CVE-2022-2625","qid":"940988","title":"AlmaLinux Security Update for postgresql (ALSA-2023:1693)"},{"cve":"CVE-2022-2625","qid":"960338","title":"Rocky Linux Security Update for postgresql:12 (RLSA-2022:7128)"},{"cve":"CVE-2022-2625","qid":"960582","title":"Rocky Linux Security Update for postgresql:10 (RLSA-2023:0113)"},{"cve":"CVE-2022-2625","qid":"960905","title":"Rocky Linux Security Update for postgresql:13 (RLSA-2023:1576)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-2625","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"postgresql","version":{"version_data":[{"version_value":"postgresql 14.5, postgresql 13.8, postgresql 12.12, postgresql 11.17, postgresql 10.22"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-915"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2113825","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2113825"},{"refsource":"MISC","name":"https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/","url":"https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/"},{"refsource":"GENTOO","name":"GLSA-202211-04","url":"https://security.gentoo.org/glsa/202211-04"}]},"description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser."}]}},"nvd":{"publishedDate":"2022-08-18 19:15:00","lastModifiedDate":"2022-12-02 20:14:00","problem_types":["CWE-1321"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0","versionEndExcluding":"10.22","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.17","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.12","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postgresql:postgresql:15:beta2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:postgresql:postgresql:15:beta1:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}