Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46185: n/a

0
Medium
VulnerabilityCVE-2025-46185cvecve-2025-46185
Published: Fri Oct 24 2025 (10/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An Insecure Permission vulnerability in pgcodekeeper 10.12.0 allows a local attacker to obtain sensitive information via the plaintext storage of passwords and usernames.

AI-Powered Analysis

AILast updated: 10/31/2025, 15:06:09 UTC

Technical Analysis

CVE-2025-46185 identifies an insecure permission vulnerability in pgcodekeeper version 10.12.0, a tool used for managing PostgreSQL database code. The vulnerability arises because sensitive credentials—usernames and passwords—are stored in plaintext on the local filesystem with insufficient access controls. This allows a local attacker, who does not require any privileges or user interaction, to read these credentials directly. The vulnerability is classified under CWE-276 (Incorrect Default Permissions), indicating that the software sets overly permissive file permissions by default. The CVSS v3.1 base score is 6.2, reflecting a medium severity level, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). No patches or fixes have been published at the time of disclosure, and there are no known exploits in the wild. The vulnerability primarily threatens confidentiality by exposing stored credentials, which could lead to further compromise if attackers leverage these credentials to access PostgreSQL databases or related systems. Since exploitation requires local access, the risk is higher in environments where multiple users have access to the same system or where attackers can gain local foothold through other means.

Potential Impact

For European organizations, the primary impact is the potential exposure of sensitive database credentials, which could lead to unauthorized access to PostgreSQL databases. This could compromise confidential data, intellectual property, or personal data protected under GDPR, leading to regulatory penalties and reputational damage. Since the vulnerability requires local access, organizations with shared development or database management environments, or those with weak endpoint security, are at higher risk. Attackers gaining local access could escalate their privileges or move laterally within networks using the exposed credentials. The lack of impact on integrity and availability limits the threat to data confidentiality; however, the exposure of credentials can be a stepping stone for more severe attacks. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is public. Organizations relying on pgcodekeeper for PostgreSQL code management should be vigilant, especially in sectors with high data sensitivity such as finance, healthcare, and government.

Mitigation Recommendations

1. Immediately audit and restrict file system permissions for pgcodekeeper configuration and credential storage files to ensure only authorized users can access them. 2. Implement strict local access controls and monitor user activities on systems running pgcodekeeper to detect unauthorized access attempts. 3. Use operating system-level encryption or secure vault solutions to store sensitive credentials instead of plaintext files. 4. Encourage the use of environment variables or secure credential management tools integrated with pgcodekeeper, if supported. 5. Apply principle of least privilege to all users and processes on systems hosting pgcodekeeper. 6. Monitor for updates from pgcodekeeper developers and apply patches promptly once available. 7. Conduct regular security training for developers and database administrators on secure credential handling. 8. Consider network segmentation to limit local access exposure and reduce lateral movement opportunities. 9. Use multi-factor authentication for database access where possible to mitigate risks from credential exposure. 10. Perform periodic security assessments and penetration testing focusing on local privilege escalation and credential exposure vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fb8a56b0116405c29b03a8

Added to database: 10/24/2025, 2:16:54 PM

Last enriched: 10/31/2025, 3:06:09 PM

Last updated: 12/10/2025, 1:01:28 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats