Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8715: Improper Neutralization of CRLF Sequences ('CRLF Injection') in PostgreSQL

0
High
VulnerabilityCVE-2025-8715cvecve-2025-8715
Published: Thu Aug 14 2025 (08/14/2025, 13:00:07 UTC)
Source: CVE Database V5
Product: PostgreSQL

Description

Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore target server. pg_dumpall, pg_restore, and pg_upgrade are also affected. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. Versions before 11.20 are unaffected. CVE-2012-0868 had fixed this class of problem, but version 11.20 reintroduced it.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:24:30 UTC

Technical Analysis

CVE-2025-8715 is a vulnerability in PostgreSQL caused by improper neutralization of CRLF (carriage return and line feed) sequences in the pg_dump utility and related tools such as pg_dumpall, pg_restore, and pg_upgrade. This flaw allows a user on the origin server to craft object names containing malicious psql meta-commands that inject arbitrary code executed during the restore process on the client side, running with the privileges of the operating system account executing psql. Additionally, if the restore is performed as a superuser on the target PostgreSQL server, the injected commands can escalate to SQL injection attacks, compromising the database's confidentiality, integrity, and availability. The vulnerability affects PostgreSQL versions 11.20 and later up to but not including 17.6, 16.10, 15.14, 14.19, and 13.22. Notably, this issue reintroduced a class of vulnerability previously fixed in CVE-2012-0868. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction. Although no exploits are currently known in the wild, the potential for arbitrary code execution and SQL injection makes this a critical concern for PostgreSQL users. The flaw arises from insufficient sanitization of newline characters in object names during dump and restore operations, enabling CRLF injection that manipulates psql meta-commands. This can lead to execution of unintended commands on the client OS or SQL commands on the database server during restoration.

Potential Impact

The impact of CVE-2025-8715 is significant for organizations relying on PostgreSQL for critical data storage and management. Exploitation can lead to arbitrary code execution on the client machine performing the restore, potentially compromising the host system and any connected networks. Furthermore, SQL injection as a superuser during restore can lead to full database compromise, data leakage, unauthorized data modification, or denial of service. This undermines the confidentiality, integrity, and availability of organizational data. Since pg_dump and related utilities are commonly used for backup and migration, this vulnerability poses a risk during routine maintenance and disaster recovery operations. Attackers with access to the origin server can weaponize dump files to execute malicious payloads on restore, potentially bypassing traditional network defenses. The vulnerability affects multiple major PostgreSQL versions, increasing the scope of impacted systems globally. Organizations that do not promptly patch or implement mitigations risk severe data breaches, operational disruption, and compliance violations.

Mitigation Recommendations

To mitigate CVE-2025-8715, organizations should immediately upgrade PostgreSQL installations to the fixed versions 17.6, 16.10, 15.14, 14.19, or 13.22 once they are released. Until patches are applied, restrict access to the origin PostgreSQL servers to trusted users only, minimizing the risk of malicious dump file creation. Validate and sanitize all object names and metadata before performing dump operations to detect suspicious characters or sequences. Avoid restoring dump files from untrusted or unknown sources. Implement strict operational controls around backup and restore procedures, including running restore operations under least-privileged OS accounts to limit potential damage from code execution. Monitor logs for unusual psql meta-command activity during restores. Employ network segmentation to isolate backup and restore environments. Consider using containerized or sandboxed environments for restore operations to contain potential exploits. Regularly audit PostgreSQL configurations and user privileges to reduce attack surface. Finally, educate database administrators about this vulnerability and the risks of restoring untrusted dumps.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
PostgreSQL
Date Reserved
2025-08-07T16:39:47.692Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689de1fdad5a09ad005b0bfb

Added to database: 8/14/2025, 1:17:49 PM

Last enriched: 2/27/2026, 4:24:30 AM

Last updated: 3/26/2026, 9:38:33 AM

Views: 205

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses