Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61385: n/a

0
Critical
VulnerabilityCVE-2025-61385cvecve-2025-61385
Published: Mon Oct 27 2025 (10/27/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

SQL injection vulnerability in tlocke pg8000 1.31.4 allows remote attackers to execute arbitrary SQL commands via a specially crafted Python list input to function pg8000.native.literal.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:52:31 UTC

Technical Analysis

CVE-2025-61385 is a critical SQL injection vulnerability identified in the pg8000 Python library version 1.31.4. The vulnerability exists in the function pg8000.native.literal, which is responsible for converting Python objects into SQL literals. Specifically, the flaw arises when the function processes a specially crafted Python list input, allowing an attacker to inject arbitrary SQL commands remotely. This injection can lead to unauthorized data access, modification, or deletion, compromising the confidentiality, integrity, and availability of the backend database. The vulnerability is exploitable over the network without requiring authentication (AV:N/PR:N), but it does require user interaction (UI:R), such as a user triggering the vulnerable code path. The scope is complete (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The CVSS v3.1 base score is 9.6, indicating critical severity. Although no public exploits are currently known, the high severity and ease of exploitation make it a significant threat. The vulnerability is categorized under CWE-89 (SQL Injection), a well-known and dangerous class of injection flaws. Since pg8000 is a pure Python PostgreSQL driver, organizations using Python applications with PostgreSQL databases that rely on this library are at risk. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation strategies.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially those that use Python applications interfacing with PostgreSQL databases via the pg8000 library. Successful exploitation could lead to unauthorized data disclosure, data corruption, or complete loss of database availability. This can disrupt business operations, cause regulatory compliance violations (e.g., GDPR), and damage reputation. Sectors such as finance, healthcare, government, and critical infrastructure, which often rely on robust database systems, are particularly vulnerable. The ability to execute arbitrary SQL commands remotely without authentication increases the attack surface and potential for widespread impact. Additionally, the requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the risk in environments with less security awareness. The absence of known exploits in the wild currently provides a window for proactive defense, but the critical severity demands urgent attention.

Mitigation Recommendations

1. Immediately audit all Python applications using pg8000 to identify usage of the pg8000.native.literal function with list inputs. 2. Implement strict input validation and sanitization to prevent maliciously crafted lists from reaching the vulnerable function. 3. Restrict database user permissions to the minimum necessary, employing the principle of least privilege to limit potential damage from SQL injection. 4. Monitor application logs and database queries for unusual or unexpected SQL commands that could indicate exploitation attempts. 5. Employ Web Application Firewalls (WAFs) or database activity monitoring tools capable of detecting and blocking SQL injection patterns. 6. Stay alert for official patches or updates from the pg8000 maintainers and apply them promptly once available. 7. Educate users and developers about the risks of social engineering that could trigger user interaction-based exploits. 8. Consider temporary mitigation by isolating vulnerable services or disabling features that invoke the vulnerable function until a patch is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ffadeaba6dffc5e2050679

Added to database: 10/27/2025, 5:37:46 PM

Last enriched: 11/3/2025, 6:52:31 PM

Last updated: 12/10/2025, 9:09:45 AM

Views: 186

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats