CVE-2025-12967: CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in AWS JDBC Wrapper
An issue in AWS Wrappers for Amazon Aurora PostgreSQL may allow for privilege escalation to rds_superuser role. A low privilege authenticated user can create a crafted function that could be executed with permissions of other Amazon Relational Database Service (RDS) users. We recommend customers upgrade to the following versions: AWS JDBC Wrapper to v2.6.5, AWS Go Wrapper to 2025-10-17, AWS NodeJS Wrapper to v2.0.1, AWS Python Wrapper to v1.4.0 and AWS PGSQL ODBC driver to v1.0.1
AI Analysis
Technical Summary
CVE-2025-12967 is a vulnerability classified under CWE-470 (Use of Externally-Controlled Input to Select Classes or Code, also known as unsafe reflection) found in AWS Wrappers for Amazon Aurora PostgreSQL, including the JDBC Wrapper, Go Wrapper, NodeJS Wrapper, Python Wrapper, and PGSQL ODBC driver. The flaw allows a low-privilege authenticated user to create a specially crafted function that can execute with the permissions of other Amazon RDS users, including the highly privileged rds_superuser role. This occurs because the wrappers improperly handle externally controlled input that selects classes or code to execute, enabling privilege escalation within the database environment. The vulnerability has a CVSS 4.0 base score of 8.6, indicating high severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as an attacker can gain elevated privileges and potentially control or disrupt database operations. AWS has addressed this vulnerability by releasing updated versions of their wrappers: AWS JDBC Wrapper v2.6.5, Go Wrapper 2025-10-17, NodeJS Wrapper v2.0.1, Python Wrapper v1.4.0, and PGSQL ODBC driver v1.0.1. No public exploits have been reported yet, but the risk remains significant due to the ease of exploitation and potential impact.
Potential Impact
The vulnerability allows attackers with low-level authenticated access to escalate privileges to the rds_superuser role, which is the highest privilege level in Amazon RDS PostgreSQL environments. This can lead to full control over the database instance, including the ability to read, modify, or delete sensitive data, create or drop database objects, and interfere with database availability. The elevated privileges also enable attackers to bypass security controls and potentially pivot to other parts of the infrastructure. Organizations relying on Amazon Aurora PostgreSQL with affected wrappers are at risk of severe data breaches, operational disruption, and compliance violations. The network-exploitable nature and lack of required user interaction increase the likelihood of exploitation in hostile environments, especially in multi-tenant or shared environments where multiple users have database access.
Mitigation Recommendations
Organizations should immediately upgrade all affected AWS Wrappers to the patched versions provided by AWS: JDBC Wrapper to v2.6.5, Go Wrapper to 2025-10-17, NodeJS Wrapper to v2.0.1, Python Wrapper to v1.4.0, and PGSQL ODBC driver to v1.0.1. Additionally, review and restrict database user privileges to the minimum necessary, implement strict authentication and access controls to limit low-privilege user capabilities, and monitor database logs for unusual function creation or privilege escalation attempts. Employ network segmentation and firewall rules to restrict access to RDS instances. Regularly audit wrapper versions and configurations to ensure compliance with security best practices. Consider deploying runtime application self-protection (RASP) or database activity monitoring (DAM) tools to detect and block suspicious behavior related to function execution and privilege escalation.
Affected Countries
United States, Germany, United Kingdom, Japan, India, Australia, Canada, France, South Korea, Singapore
CVE-2025-12967: CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in AWS JDBC Wrapper
Description
An issue in AWS Wrappers for Amazon Aurora PostgreSQL may allow for privilege escalation to rds_superuser role. A low privilege authenticated user can create a crafted function that could be executed with permissions of other Amazon Relational Database Service (RDS) users. We recommend customers upgrade to the following versions: AWS JDBC Wrapper to v2.6.5, AWS Go Wrapper to 2025-10-17, AWS NodeJS Wrapper to v2.0.1, AWS Python Wrapper to v1.4.0 and AWS PGSQL ODBC driver to v1.0.1
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12967 is a vulnerability classified under CWE-470 (Use of Externally-Controlled Input to Select Classes or Code, also known as unsafe reflection) found in AWS Wrappers for Amazon Aurora PostgreSQL, including the JDBC Wrapper, Go Wrapper, NodeJS Wrapper, Python Wrapper, and PGSQL ODBC driver. The flaw allows a low-privilege authenticated user to create a specially crafted function that can execute with the permissions of other Amazon RDS users, including the highly privileged rds_superuser role. This occurs because the wrappers improperly handle externally controlled input that selects classes or code to execute, enabling privilege escalation within the database environment. The vulnerability has a CVSS 4.0 base score of 8.6, indicating high severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as an attacker can gain elevated privileges and potentially control or disrupt database operations. AWS has addressed this vulnerability by releasing updated versions of their wrappers: AWS JDBC Wrapper v2.6.5, Go Wrapper 2025-10-17, NodeJS Wrapper v2.0.1, Python Wrapper v1.4.0, and PGSQL ODBC driver v1.0.1. No public exploits have been reported yet, but the risk remains significant due to the ease of exploitation and potential impact.
Potential Impact
The vulnerability allows attackers with low-level authenticated access to escalate privileges to the rds_superuser role, which is the highest privilege level in Amazon RDS PostgreSQL environments. This can lead to full control over the database instance, including the ability to read, modify, or delete sensitive data, create or drop database objects, and interfere with database availability. The elevated privileges also enable attackers to bypass security controls and potentially pivot to other parts of the infrastructure. Organizations relying on Amazon Aurora PostgreSQL with affected wrappers are at risk of severe data breaches, operational disruption, and compliance violations. The network-exploitable nature and lack of required user interaction increase the likelihood of exploitation in hostile environments, especially in multi-tenant or shared environments where multiple users have database access.
Mitigation Recommendations
Organizations should immediately upgrade all affected AWS Wrappers to the patched versions provided by AWS: JDBC Wrapper to v2.6.5, Go Wrapper to 2025-10-17, NodeJS Wrapper to v2.0.1, Python Wrapper to v1.4.0, and PGSQL ODBC driver to v1.0.1. Additionally, review and restrict database user privileges to the minimum necessary, implement strict authentication and access controls to limit low-privilege user capabilities, and monitor database logs for unusual function creation or privilege escalation attempts. Employ network segmentation and firewall rules to restrict access to RDS instances. Regularly audit wrapper versions and configurations to ensure compliance with security best practices. Consider deploying runtime application self-protection (RASP) or database activity monitoring (DAM) tools to detect and block suspicious behavior related to function execution and privilege escalation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- AMZN
- Date Reserved
- 2025-11-10T17:36:11.337Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69122d25a4f3f0878303d256
Added to database: 11/10/2025, 6:21:25 PM
Last enriched: 2/26/2026, 10:18:00 PM
Last updated: 3/24/2026, 10:48:47 PM
Views: 339
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.