Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12817: Missing Authorization in PostgreSQL

0
Low
VulnerabilityCVE-2025-12817cvecve-2025-12817
Published: Thu Nov 13 2025 (11/13/2025, 13:00:12 UTC)
Source: CVE Database V5
Product: PostgreSQL

Description

Missing authorization in PostgreSQL CREATE STATISTICS command allows a table owner to achieve denial of service against other CREATE STATISTICS users by creating in any schema. A later CREATE STATISTICS for the same name, from a user having the CREATE privilege, would then fail. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.

AI-Powered Analysis

AILast updated: 11/13/2025, 13:21:20 UTC

Technical Analysis

CVE-2025-12817 is a vulnerability in PostgreSQL's CREATE STATISTICS command caused by missing authorization checks. Specifically, a table owner can create statistics objects in any schema without proper authorization, which should normally be restricted. This flaw allows the table owner to create a statistics object with a given name that blocks other users who also have CREATE privileges from creating statistics objects with the same name later. The denial of service arises because PostgreSQL prevents duplicate statistics object names, so once the table owner creates one, subsequent CREATE STATISTICS commands for that name fail for other users. This affects PostgreSQL versions prior to 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23. The vulnerability impacts availability of the CREATE STATISTICS functionality but does not compromise confidentiality or integrity of data. Exploitation requires the attacker to be a table owner, which is a relatively low privilege level but still requires some level of access. No user interaction is needed, and the attack can be performed remotely if the attacker has database access. There are no known exploits in the wild, and the CVSS score is 3.1, indicating low severity. The root cause is an authorization bypass in the statistics creation process, which PostgreSQL developers have addressed in the fixed versions. Organizations relying on PostgreSQL's query optimization and statistics features may experience degraded performance or monitoring issues if this vulnerability is exploited.

Potential Impact

For European organizations, the primary impact of CVE-2025-12817 is a denial of service affecting the creation of statistics objects in PostgreSQL databases. This can disrupt database administrators' and developers' ability to maintain accurate statistics used for query planning and optimization, potentially leading to suboptimal query performance and degraded application responsiveness. While this does not directly expose sensitive data or allow data manipulation, the availability impact can affect business-critical applications relying on PostgreSQL for data processing. Organizations with multi-tenant or shared database environments are at higher risk, as a malicious or compromised table owner could intentionally block other users from creating necessary statistics. This could lead to operational disruptions, increased troubleshooting efforts, and potential downtime. Given PostgreSQL's widespread adoption in European public and private sectors, especially in finance, government, and technology industries, the vulnerability could have broad operational implications if left unpatched. However, the low severity and requirement for table owner privileges limit the scope of impact to environments where such privileges are granted to potentially untrusted users.

Mitigation Recommendations

To mitigate CVE-2025-12817, European organizations should prioritize upgrading PostgreSQL to the fixed versions: 18.1, 17.7, 16.11, 15.15, 14.20, or 13.23. If immediate upgrading is not feasible, organizations should implement strict privilege management by limiting the assignment of table owner roles to trusted users only. Regular audits of database roles and permissions should be conducted to ensure no unnecessary table owner privileges are granted. Additionally, monitoring and alerting on CREATE STATISTICS commands can help detect anomalous or unauthorized usage patterns indicative of exploitation attempts. Database administrators should also consider segregating schemas and enforcing schema-level permissions to reduce the risk of cross-schema interference. Backup and recovery procedures should be reviewed to ensure rapid restoration of database functionality in case of denial of service. Finally, organizations should stay informed about PostgreSQL security advisories and apply patches promptly to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
PostgreSQL
Date Reserved
2025-11-06T17:22:31.286Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6915d923f0c8e942cdf27492

Added to database: 11/13/2025, 1:12:03 PM

Last enriched: 11/13/2025, 1:21:20 PM

Last updated: 11/14/2025, 6:19:41 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats