CVE-2026-29089: CWE-426: Untrusted Search Path in timescale timescaledb
TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, operators). If the search_path includes user-writable schemas a malicious user can create functions in that schema that shadow builtin postgres functions and will be called instead of the postgres functions leading to arbitrary code execution during extension upgrade. This issue has been patched in version 2.25.2.
AI Analysis
Technical Summary
CVE-2026-29089 is a vulnerability in TimescaleDB, a PostgreSQL extension designed for high-performance time-series analytics. The issue arises from the way PostgreSQL's search_path setting is used between versions 2.23.0 and 2.25.1 of TimescaleDB. The search_path determines the order in which schemas are searched for unqualified database objects such as tables and functions. If the search_path includes schemas writable by untrusted users, these users can create malicious functions that shadow or override built-in PostgreSQL functions. When the TimescaleDB extension is upgraded, these malicious functions may be invoked instead of the legitimate ones, resulting in arbitrary code execution within the database server process. This can lead to full compromise of the database environment, including unauthorized data access, modification, or destruction. The vulnerability is classified under CWE-426 (Untrusted Search Path), highlighting the risk of executing unintended code due to insecure path configurations. The vulnerability requires only low privileges (PR:L) and no user interaction (UI:N), but the scope is changed (S:C) as it can affect the entire database system. The CVSS v3.1 score is 8.8 (high), reflecting the critical impact on confidentiality, integrity, and availability. The issue was addressed in TimescaleDB version 2.25.2 by correcting the search_path handling to prevent untrusted schemas from being used during extension upgrades. No known exploits in the wild have been reported yet, but the potential impact warrants immediate attention.
Potential Impact
The vulnerability allows a malicious user with limited privileges to execute arbitrary code with the database server's privileges during extension upgrades. This can lead to full compromise of the database, including unauthorized data disclosure, data manipulation, or denial of service. Organizations relying on TimescaleDB for critical real-time analytics and time-series data processing face risks of data breaches, operational disruption, and potential lateral movement within their infrastructure. Since TimescaleDB is often used in industries such as finance, telecommunications, IoT, and monitoring systems, the impact could extend to critical business functions and regulatory compliance violations. The ease of exploitation combined with the high privileges gained makes this a significant threat to confidentiality, integrity, and availability of affected systems.
Mitigation Recommendations
The primary mitigation is to upgrade TimescaleDB to version 2.25.2 or later, where the vulnerability is patched. Until upgrading, organizations should audit and restrict schema permissions to ensure that user-writable schemas are not included in the search_path used by PostgreSQL and TimescaleDB. Database administrators should review and harden the search_path configuration to exclude untrusted or user-controlled schemas. Additionally, monitoring and alerting on extension upgrade activities and unusual function creations in user schemas can help detect exploitation attempts. Employing the principle of least privilege for database users and limiting the ability to perform extension upgrades to trusted administrators reduces risk. Regularly applying security patches and maintaining an inventory of TimescaleDB versions in use are also critical steps.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-29089: CWE-426: Untrusted Search Path in timescale timescaledb
Description
TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, operators). If the search_path includes user-writable schemas a malicious user can create functions in that schema that shadow builtin postgres functions and will be called instead of the postgres functions leading to arbitrary code execution during extension upgrade. This issue has been patched in version 2.25.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-29089 is a vulnerability in TimescaleDB, a PostgreSQL extension designed for high-performance time-series analytics. The issue arises from the way PostgreSQL's search_path setting is used between versions 2.23.0 and 2.25.1 of TimescaleDB. The search_path determines the order in which schemas are searched for unqualified database objects such as tables and functions. If the search_path includes schemas writable by untrusted users, these users can create malicious functions that shadow or override built-in PostgreSQL functions. When the TimescaleDB extension is upgraded, these malicious functions may be invoked instead of the legitimate ones, resulting in arbitrary code execution within the database server process. This can lead to full compromise of the database environment, including unauthorized data access, modification, or destruction. The vulnerability is classified under CWE-426 (Untrusted Search Path), highlighting the risk of executing unintended code due to insecure path configurations. The vulnerability requires only low privileges (PR:L) and no user interaction (UI:N), but the scope is changed (S:C) as it can affect the entire database system. The CVSS v3.1 score is 8.8 (high), reflecting the critical impact on confidentiality, integrity, and availability. The issue was addressed in TimescaleDB version 2.25.2 by correcting the search_path handling to prevent untrusted schemas from being used during extension upgrades. No known exploits in the wild have been reported yet, but the potential impact warrants immediate attention.
Potential Impact
The vulnerability allows a malicious user with limited privileges to execute arbitrary code with the database server's privileges during extension upgrades. This can lead to full compromise of the database, including unauthorized data disclosure, data manipulation, or denial of service. Organizations relying on TimescaleDB for critical real-time analytics and time-series data processing face risks of data breaches, operational disruption, and potential lateral movement within their infrastructure. Since TimescaleDB is often used in industries such as finance, telecommunications, IoT, and monitoring systems, the impact could extend to critical business functions and regulatory compliance violations. The ease of exploitation combined with the high privileges gained makes this a significant threat to confidentiality, integrity, and availability of affected systems.
Mitigation Recommendations
The primary mitigation is to upgrade TimescaleDB to version 2.25.2 or later, where the vulnerability is patched. Until upgrading, organizations should audit and restrict schema permissions to ensure that user-writable schemas are not included in the search_path used by PostgreSQL and TimescaleDB. Database administrators should review and harden the search_path configuration to exclude untrusted or user-controlled schemas. Additionally, monitoring and alerting on extension upgrade activities and unusual function creations in user schemas can help detect exploitation attempts. Employing the principle of least privilege for database users and limiting the ability to perform extension upgrades to trusted administrators reduces risk. Regularly applying security patches and maintaining an inventory of TimescaleDB versions in use are also critical steps.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-03T21:54:06.707Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ab0f59c48b3f10ffb6232f
Added to database: 3/6/2026, 5:31:05 PM
Last enriched: 3/13/2026, 7:19:52 PM
Last updated: 4/21/2026, 10:38:52 AM
Views: 250
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.