Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12967: CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in AWS JDBC Wrapper

0
High
VulnerabilityCVE-2025-12967cvecve-2025-12967cwe-470
Published: Mon Nov 10 2025 (11/10/2025, 18:09:10 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: JDBC Wrapper

Description

An issue in AWS Wrappers for Amazon Aurora PostgreSQL may allow for privilege escalation to rds_superuser role. A low privilege authenticated user can create a crafted function that could be executed with permissions of other Amazon Relational Database Service (RDS) users. We recommend customers upgrade to the following versions: AWS JDBC Wrapper to v2.6.5, AWS Go Wrapper to 2025-10-17, AWS NodeJS Wrapper to v2.0.1, AWS Python Wrapper to v1.4.0 and AWS PGSQL ODBC driver to v1.0.1

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:18:00 UTC

Technical Analysis

CVE-2025-12967 is a vulnerability classified under CWE-470 (Use of Externally-Controlled Input to Select Classes or Code, also known as unsafe reflection) found in AWS Wrappers for Amazon Aurora PostgreSQL, including the JDBC Wrapper, Go Wrapper, NodeJS Wrapper, Python Wrapper, and PGSQL ODBC driver. The flaw allows a low-privilege authenticated user to create a specially crafted function that can execute with the permissions of other Amazon RDS users, including the highly privileged rds_superuser role. This occurs because the wrappers improperly handle externally controlled input that selects classes or code to execute, enabling privilege escalation within the database environment. The vulnerability has a CVSS 4.0 base score of 8.6, indicating high severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as an attacker can gain elevated privileges and potentially control or disrupt database operations. AWS has addressed this vulnerability by releasing updated versions of their wrappers: AWS JDBC Wrapper v2.6.5, Go Wrapper 2025-10-17, NodeJS Wrapper v2.0.1, Python Wrapper v1.4.0, and PGSQL ODBC driver v1.0.1. No public exploits have been reported yet, but the risk remains significant due to the ease of exploitation and potential impact.

Potential Impact

The vulnerability allows attackers with low-level authenticated access to escalate privileges to the rds_superuser role, which is the highest privilege level in Amazon RDS PostgreSQL environments. This can lead to full control over the database instance, including the ability to read, modify, or delete sensitive data, create or drop database objects, and interfere with database availability. The elevated privileges also enable attackers to bypass security controls and potentially pivot to other parts of the infrastructure. Organizations relying on Amazon Aurora PostgreSQL with affected wrappers are at risk of severe data breaches, operational disruption, and compliance violations. The network-exploitable nature and lack of required user interaction increase the likelihood of exploitation in hostile environments, especially in multi-tenant or shared environments where multiple users have database access.

Mitigation Recommendations

Organizations should immediately upgrade all affected AWS Wrappers to the patched versions provided by AWS: JDBC Wrapper to v2.6.5, Go Wrapper to 2025-10-17, NodeJS Wrapper to v2.0.1, Python Wrapper to v1.4.0, and PGSQL ODBC driver to v1.0.1. Additionally, review and restrict database user privileges to the minimum necessary, implement strict authentication and access controls to limit low-privilege user capabilities, and monitor database logs for unusual function creation or privilege escalation attempts. Employ network segmentation and firewall rules to restrict access to RDS instances. Regularly audit wrapper versions and configurations to ensure compliance with security best practices. Consider deploying runtime application self-protection (RASP) or database activity monitoring (DAM) tools to detect and block suspicious behavior related to function execution and privilege escalation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2025-11-10T17:36:11.337Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69122d25a4f3f0878303d256

Added to database: 11/10/2025, 6:21:25 PM

Last enriched: 2/26/2026, 10:18:00 PM

Last updated: 3/24/2026, 10:48:47 PM

Views: 339

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses