Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29089: CWE-426: Untrusted Search Path in timescale timescaledb

0
High
VulnerabilityCVE-2026-29089cvecve-2026-29089cwe-426
Published: Fri Mar 06 2026 (03/06/2026, 17:06:34 UTC)
Source: CVE Database V5
Vendor/Project: timescale
Product: timescaledb

Description

TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, operators). If the search_path includes user-writable schemas a malicious user can create functions in that schema that shadow builtin postgres functions and will be called instead of the postgres functions leading to arbitrary code execution during extension upgrade. This issue has been patched in version 2.25.2.

AI-Powered Analysis

AILast updated: 03/06/2026, 17:45:21 UTC

Technical Analysis

CVE-2026-29089 is a vulnerability in TimescaleDB, a PostgreSQL extension designed for high-performance time-series data analytics. The flaw arises from the way PostgreSQL resolves unqualified database objects using the search_path setting. Between versions 2.23.0 and 2.25.1, if the search_path includes schemas writable by untrusted users, those users can create malicious functions that shadow or override built-in PostgreSQL functions. When the TimescaleDB extension is upgraded, these malicious functions may be executed instead of the legitimate ones, resulting in arbitrary code execution within the database server context. This can lead to full compromise of the database environment, including unauthorized data access, data manipulation, or denial of service. The vulnerability is classified under CWE-426 (Untrusted Search Path) and has a CVSS v3.1 score of 8.8, indicating high severity. Exploitation requires low privileges (PR:L), no user interaction, and the attack scope is changed (S:C), affecting confidentiality, integrity, and availability. The issue was publicly disclosed and patched in TimescaleDB version 2.25.2. No known exploits in the wild have been reported yet, but the potential impact is significant given the nature of the vulnerability and the widespread use of TimescaleDB in real-time analytics environments.

Potential Impact

The vulnerability allows a malicious user with limited privileges to execute arbitrary code on the database server by exploiting the untrusted search path in TimescaleDB. This can lead to full compromise of the database, including unauthorized data disclosure, data tampering, and disruption of database services. Organizations relying on TimescaleDB for critical real-time analytics and time-series data processing may face severe operational disruptions and data breaches. The compromise of database integrity and availability can cascade into broader application and infrastructure impacts, especially in environments where TimescaleDB is integrated with other systems. The high CVSS score reflects the broad impact on confidentiality, integrity, and availability, combined with the relatively low complexity of exploitation. This threat is particularly concerning for multi-tenant environments or systems with multiple database users where schema permissions are not tightly controlled.

Mitigation Recommendations

1. Upgrade TimescaleDB to version 2.25.2 or later immediately to apply the official patch addressing this vulnerability. 2. Audit and restrict schema permissions to ensure that user-writable schemas are not included in the search_path or are tightly controlled to prevent untrusted users from creating or modifying functions. 3. Implement strict role-based access controls (RBAC) within PostgreSQL to limit the ability of users to alter search_path settings or create functions in schemas accessible during extension upgrades. 4. Monitor database logs for unusual function creation or schema modifications, especially during extension upgrade operations. 5. Use database security best practices such as isolating database users, minimizing privileges, and employing database activity monitoring tools to detect anomalous behavior. 6. Consider deploying runtime protections or sandboxing mechanisms to limit the impact of arbitrary code execution within the database environment. 7. Regularly review and update database extension versions and configurations as part of a comprehensive patch management strategy.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T21:54:06.707Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ab0f59c48b3f10ffb6232f

Added to database: 3/6/2026, 5:31:05 PM

Last enriched: 3/6/2026, 5:45:21 PM

Last updated: 3/7/2026, 9:16:27 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses