CVE-2025-12967: CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in AWS JDBC Wrapper
An issue in AWS Wrappers for Amazon Aurora PostgreSQL may allow for privilege escalation to rds_superuser role. A low privilege authenticated user can create a crafted function that could be executed with permissions of other Amazon Relational Database Service (RDS) users. We recommend customers upgrade to the following versions: AWS JDBC Wrapper to v2.6.5, AWS Go Wrapper to 2025-10-17, AWS NodeJS Wrapper to v2.0.1, AWS Python Wrapper to v1.4.0 and AWS PGSQL ODBC driver to v1.0.1
AI Analysis
Technical Summary
CVE-2025-12967 is a vulnerability classified under CWE-470 (Use of Externally-Controlled Input to Select Classes or Code, also known as 'Unsafe Reflection') affecting AWS Wrappers for Amazon Aurora PostgreSQL. The issue allows a low-privilege authenticated user to create a specially crafted function that can be executed with the permissions of other Amazon RDS users, including the highly privileged rds_superuser role. This privilege escalation occurs because the wrappers improperly handle externally supplied input to dynamically select classes or code paths, enabling unsafe reflection. The affected components include AWS JDBC Wrapper, Go Wrapper, NodeJS Wrapper, Python Wrapper, and PGSQL ODBC driver. Exploiting this vulnerability requires an authenticated user with low privileges and some user interaction, but no administrative privileges or complex attack vectors. The vulnerability can lead to unauthorized access to sensitive database operations, data modification, or disruption of service. AWS has addressed this issue by releasing updated versions of the wrappers: JDBC Wrapper v2.6.5, Go Wrapper 2025-10-17, NodeJS Wrapper v2.01, Python Wrapper v1.4.0, and PGSQL ODBC driver v1.0.1. No known exploits are currently reported in the wild. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges required beyond low privilege, user interaction required, and high impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations utilizing Amazon Aurora PostgreSQL with AWS Wrappers, this vulnerability poses a significant risk of privilege escalation, potentially allowing attackers to gain rds_superuser privileges. This can lead to unauthorized data access, data manipulation, or disruption of database services, severely impacting confidentiality, integrity, and availability of critical business data. Given the widespread adoption of AWS cloud services across Europe, especially in sectors like finance, healthcare, and government, exploitation could result in regulatory non-compliance, financial losses, and reputational damage. The requirement for authenticated access limits the attack surface to insiders or compromised accounts, but the ease of exploitation and high privileges gained amplify the threat. The vulnerability could also facilitate lateral movement within cloud environments, increasing the scope of impact.
Mitigation Recommendations
European organizations should immediately upgrade all affected AWS Wrappers to the patched versions: JDBC Wrapper to v2.6.5, Go Wrapper to 2025-10-17, NodeJS Wrapper to v2.01, Python Wrapper to v1.4.0, and PGSQL ODBC driver to v1.0.1. Additionally, restrict the ability to create or execute user-defined functions to trusted and minimal sets of users. Implement strict monitoring and alerting on database function creation and privilege escalations. Employ strong authentication mechanisms and enforce least privilege principles for database users. Conduct regular audits of database roles and permissions to detect anomalies. Consider network segmentation and use of AWS security features such as IAM policies and RDS security groups to limit access. Finally, maintain up-to-date incident response plans tailored to cloud database environments.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland
CVE-2025-12967: CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in AWS JDBC Wrapper
Description
An issue in AWS Wrappers for Amazon Aurora PostgreSQL may allow for privilege escalation to rds_superuser role. A low privilege authenticated user can create a crafted function that could be executed with permissions of other Amazon Relational Database Service (RDS) users. We recommend customers upgrade to the following versions: AWS JDBC Wrapper to v2.6.5, AWS Go Wrapper to 2025-10-17, AWS NodeJS Wrapper to v2.0.1, AWS Python Wrapper to v1.4.0 and AWS PGSQL ODBC driver to v1.0.1
AI-Powered Analysis
Technical Analysis
CVE-2025-12967 is a vulnerability classified under CWE-470 (Use of Externally-Controlled Input to Select Classes or Code, also known as 'Unsafe Reflection') affecting AWS Wrappers for Amazon Aurora PostgreSQL. The issue allows a low-privilege authenticated user to create a specially crafted function that can be executed with the permissions of other Amazon RDS users, including the highly privileged rds_superuser role. This privilege escalation occurs because the wrappers improperly handle externally supplied input to dynamically select classes or code paths, enabling unsafe reflection. The affected components include AWS JDBC Wrapper, Go Wrapper, NodeJS Wrapper, Python Wrapper, and PGSQL ODBC driver. Exploiting this vulnerability requires an authenticated user with low privileges and some user interaction, but no administrative privileges or complex attack vectors. The vulnerability can lead to unauthorized access to sensitive database operations, data modification, or disruption of service. AWS has addressed this issue by releasing updated versions of the wrappers: JDBC Wrapper v2.6.5, Go Wrapper 2025-10-17, NodeJS Wrapper v2.01, Python Wrapper v1.4.0, and PGSQL ODBC driver v1.0.1. No known exploits are currently reported in the wild. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges required beyond low privilege, user interaction required, and high impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations utilizing Amazon Aurora PostgreSQL with AWS Wrappers, this vulnerability poses a significant risk of privilege escalation, potentially allowing attackers to gain rds_superuser privileges. This can lead to unauthorized data access, data manipulation, or disruption of database services, severely impacting confidentiality, integrity, and availability of critical business data. Given the widespread adoption of AWS cloud services across Europe, especially in sectors like finance, healthcare, and government, exploitation could result in regulatory non-compliance, financial losses, and reputational damage. The requirement for authenticated access limits the attack surface to insiders or compromised accounts, but the ease of exploitation and high privileges gained amplify the threat. The vulnerability could also facilitate lateral movement within cloud environments, increasing the scope of impact.
Mitigation Recommendations
European organizations should immediately upgrade all affected AWS Wrappers to the patched versions: JDBC Wrapper to v2.6.5, Go Wrapper to 2025-10-17, NodeJS Wrapper to v2.01, Python Wrapper to v1.4.0, and PGSQL ODBC driver to v1.0.1. Additionally, restrict the ability to create or execute user-defined functions to trusted and minimal sets of users. Implement strict monitoring and alerting on database function creation and privilege escalations. Employ strong authentication mechanisms and enforce least privilege principles for database users. Conduct regular audits of database roles and permissions to detect anomalies. Consider network segmentation and use of AWS security features such as IAM policies and RDS security groups to limit access. Finally, maintain up-to-date incident response plans tailored to cloud database environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- AMZN
- Date Reserved
- 2025-11-10T17:36:11.337Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69122d25a4f3f0878303d256
Added to database: 11/10/2025, 6:21:25 PM
Last enriched: 11/10/2025, 6:33:18 PM
Last updated: 11/11/2025, 2:58:52 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
OWASP Highlights Supply Chain Risks in New Top 10 List
HighCVE-2025-42940: CWE-787: Out-of-bounds Write in SAP_SE SAP CommonCryptoLib
HighCVE-2025-42924: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP S/4HANA landscape (SAP E-Recruiting BSP)
MediumCVE-2025-42919: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in SAP_SE SAP NetWeaver Application Server Java
MediumCVE-2025-42899: CWE-862: Missing Authorization in SAP_SE SAP S4CORE (Manage Journal Entries)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.