Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12817: Missing Authorization in PostgreSQL

0
Low
VulnerabilityCVE-2025-12817cvecve-2025-12817
Published: Thu Nov 13 2025 (11/13/2025, 13:00:12 UTC)
Source: CVE Database V5
Product: PostgreSQL

Description

CVE-2025-12817 is a low-severity vulnerability in PostgreSQL affecting versions prior to 18. 1, 17. 7, 16. 11, 15. 15, 14. 20, and 13. 23. It involves missing authorization checks in the CREATE STATISTICS command, allowing a table owner to cause denial of service (DoS) against other users by creating statistics objects in any schema. This prevents other users with CREATE privileges from creating statistics with the same name, leading to failed operations. Exploitation requires low privileges (table owner) but no user interaction.

AI-Powered Analysis

AILast updated: 11/20/2025, 14:19:18 UTC

Technical Analysis

CVE-2025-12817 is a vulnerability in PostgreSQL's CREATE STATISTICS command caused by missing authorization checks. Specifically, a table owner can create statistics objects in any schema without proper permission validation. This flaw enables the owner to block other users who also have CREATE privileges from creating statistics objects with the same name, effectively causing a denial of service (DoS) condition for those users. The vulnerability affects multiple PostgreSQL versions before 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23. The attack vector is network-based with a high attack complexity, requiring the attacker to have low privileges (table owner) but no user interaction. The vulnerability does not impact confidentiality or integrity but can degrade availability by preventing legitimate CREATE STATISTICS commands from succeeding. No known exploits have been reported in the wild, and patches are expected or available in the fixed versions. This issue is particularly relevant in environments where multiple users share database access and rely on statistics for query optimization and performance.

Potential Impact

For European organizations, the primary impact of CVE-2025-12817 is a denial of service condition affecting database operations related to statistics creation. This can degrade database performance and query optimization, potentially impacting application responsiveness and availability. Organizations with multi-tenant or multi-user PostgreSQL deployments are at higher risk, as one user can disrupt others' ability to maintain accurate statistics. While the vulnerability does not expose sensitive data or allow unauthorized data modification, the availability impact can affect business-critical applications relying on PostgreSQL. Industries with heavy database usage such as finance, healthcare, and e-commerce in Europe could experience operational disruptions if unpatched. The low severity and lack of known exploits reduce immediate risk, but the potential for internal misuse or accidental disruption remains.

Mitigation Recommendations

European organizations should promptly upgrade affected PostgreSQL instances to versions 18.1, 17.7, 16.11, 15.15, 14.20, or 13.23 or later where the vulnerability is fixed. Until patching, restrict CREATE STATISTICS privileges to trusted users only and monitor usage patterns for unusual statistics creation attempts. Implement role-based access controls to limit table ownership and schema modification rights. Regularly audit database permissions and schema objects to detect unauthorized statistics objects. Employ database activity monitoring tools to alert on failed CREATE STATISTICS commands that may indicate attempted exploitation. Additionally, educate database administrators and users about the risk and encourage prompt reporting of anomalies. Avoid granting unnecessary CREATE privileges in shared environments to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
PostgreSQL
Date Reserved
2025-11-06T17:22:31.286Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6915d923f0c8e942cdf27492

Added to database: 11/13/2025, 1:12:03 PM

Last enriched: 11/20/2025, 2:19:18 PM

Last updated: 12/29/2025, 8:18:08 AM

Views: 285

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats