Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25212: n/a

0
Critical
VulnerabilityCVE-2026-25212cvecve-2026-25212
Published: Thu Apr 02 2026 (04/02/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Percona PMM before 3.7. Because an internal database user retains specific superuser privileges, an attacker with pmm-admin rights can abuse the "Add data source" feature to break out of the database context and execute shell commands on the underlying operating system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 16:39:13 UTC

Technical Analysis

CVE-2026-25212 is a critical vulnerability identified in Percona PMM (Percona Monitoring and Management) versions prior to 3.7. The root cause lies in an internal database user that retains superuser privileges, which should have been restricted or removed. This design flaw allows an attacker who already has pmm-admin rights to abuse the "Add data source" feature. Normally, this feature is intended to add new database sources for monitoring purposes. However, due to the elevated privileges of the internal user, the attacker can escape the database context and execute arbitrary shell commands on the underlying operating system. This effectively leads to remote code execution (RCE) on the host running Percona PMM. The vulnerability does not require additional authentication beyond pmm-admin access, which means that any compromise of these credentials or accounts can lead to full system compromise. No CVSS score has been assigned yet, and no public exploits are known at this time. The vulnerability was reserved in January 2026 and published in April 2026. The lack of patch links suggests that fixes may be forthcoming or in progress. This vulnerability highlights the risks of excessive privileges within internal components and the importance of strict privilege separation in database management tools.

Potential Impact

The impact of CVE-2026-25212 is severe for organizations using vulnerable versions of Percona PMM. An attacker with pmm-admin rights can gain full control over the underlying operating system, leading to complete system compromise. This can result in unauthorized data access, data manipulation, service disruption, and potential lateral movement within the network. The confidentiality, integrity, and availability of monitored systems and data are at risk. Since Percona PMM is widely used for database monitoring in enterprises, cloud environments, and managed service providers, exploitation could affect critical infrastructure and business operations globally. The vulnerability increases the attack surface by allowing privilege escalation from a database monitoring context to OS-level control, which is particularly dangerous in environments where Percona PMM is deployed on production servers or in containerized/cloud environments. The absence of known exploits currently reduces immediate risk but does not diminish the urgency for mitigation given the potential damage.

Mitigation Recommendations

To mitigate CVE-2026-25212, organizations should take the following specific actions: 1) Immediately restrict pmm-admin access to trusted administrators only, enforcing strong authentication and monitoring for unusual activity. 2) Disable or limit the "Add data source" feature if it is not essential, reducing the attack surface. 3) Monitor logs and audit trails for any attempts to add data sources or execute unusual commands from the PMM environment. 4) Apply the official patch or upgrade to Percona PMM version 3.7 or later once it becomes available to remove the excessive superuser privileges from the internal database user. 5) Implement network segmentation to isolate Percona PMM servers from critical infrastructure and limit lateral movement in case of compromise. 6) Conduct regular security reviews of database monitoring tools and their privilege configurations to prevent similar issues. 7) Consider deploying host-based intrusion detection systems (HIDS) to detect unauthorized shell command executions on PMM hosts. These measures go beyond generic advice by focusing on privilege restriction, feature control, and proactive monitoring tailored to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-30T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69ce9803e6bfc5ba1dea5ac5

Added to database: 4/2/2026, 4:23:31 PM

Last enriched: 4/2/2026, 4:39:13 PM

Last updated: 4/3/2026, 5:56:44 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses