Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2360: Uncontrolled Search Path Element in DALIBO PostgreSQL Anonymizer

0
High
VulnerabilityCVE-2026-2360cvecve-2026-2360
Published: Wed Feb 11 2026 (02/11/2026, 17:47:55 UTC)
Source: CVE Database V5
Vendor/Project: DALIBO
Product: PostgreSQL Anonymizer

Description

PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a custom operator in the public schema and place malicious code in that operator. This operator will later be executed with superuser privileges when the extension is created. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version. With PostgreSQL 15 and later, the creation permission on the public schema is revoked by default and this exploit can only be achieved if a superuser adds a new schema in her/his own search_path and grants the CREATE privilege on that schema to untrusted users, both actions being clearly discouraged by the PostgreSQL documentation. The problem is resolved in PostgreSQL Anonymizer 3.0.1 and further versions

AI-Powered Analysis

AILast updated: 02/11/2026, 18:30:45 UTC

Technical Analysis

The vulnerability identified as CVE-2026-2360 affects the DALIBO PostgreSQL Anonymizer extension, specifically version 1. It arises from an uncontrolled search path element that allows an attacker with certain privileges to escalate to superuser by creating a malicious custom operator in the public schema. When the extension is created, this operator is executed with superuser privileges, enabling arbitrary code execution at the highest privilege level. The risk is particularly pronounced in PostgreSQL 14 or instances upgraded from PostgreSQL 14 or earlier, where the public schema retains CREATE permissions for non-superusers, facilitating the attack vector. PostgreSQL 15 and later versions mitigate this risk by revoking CREATE permissions on the public schema by default, but the vulnerability remains exploitable if a superuser adds a schema to their search_path and grants CREATE privileges to untrusted users, which is against recommended best practices. The vulnerability impacts confidentiality, integrity, and availability by allowing full control over the database server. The issue is resolved in PostgreSQL Anonymizer version 3.0.1 and later, which presumably implements stricter schema permission controls and validation to prevent malicious operator creation. The CVSS v3.1 score of 8.0 reflects the high impact and complexity of the attack, requiring high privileges but no user interaction. No known exploits have been reported in the wild, but the vulnerability poses a significant risk if exploited.

Potential Impact

For European organizations, this vulnerability could lead to complete compromise of PostgreSQL database servers running the affected PostgreSQL Anonymizer extension version 1, especially on PostgreSQL 14 or upgraded instances. Attackers gaining superuser privileges could exfiltrate sensitive data, alter or destroy data integrity, disrupt availability, and potentially pivot to other internal systems. This is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government institutions across Europe. The ability to execute arbitrary code with superuser privileges undermines trust in data anonymization processes, potentially exposing personal data that was intended to be protected. The impact is exacerbated in multi-tenant environments or cloud-hosted PostgreSQL instances where privilege boundaries are crucial. Organizations that have upgraded to PostgreSQL 15 or later but have misconfigured schema permissions remain at risk. The lack of known exploits in the wild suggests limited immediate threat but does not diminish the potential severity if exploited.

Mitigation Recommendations

European organizations should immediately upgrade the PostgreSQL Anonymizer extension to version 3.0.1 or later to remediate this vulnerability. Review and harden schema permissions by ensuring that the public schema does not grant CREATE privileges to non-superusers, especially on PostgreSQL 14 or upgraded instances. Avoid adding custom schemas with CREATE privileges for untrusted users in the search_path. Implement strict role-based access controls limiting who can create operators or extensions. Regularly audit database roles and permissions to detect misconfigurations. Employ monitoring and alerting for unusual extension creation or operator definition activities. Consider isolating critical databases and applying network segmentation to limit exposure. Finally, maintain up-to-date backups and test recovery procedures to mitigate potential data loss from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
PostgreSQL
Date Reserved
2026-02-11T17:11:41.119Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698cc7724b57a58fa1b0b321

Added to database: 2/11/2026, 6:16:18 PM

Last enriched: 2/11/2026, 6:30:45 PM

Last updated: 2/11/2026, 7:19:32 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats