Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3172: Integer Underflow or Wraparound in pgvector

0
High
VulnerabilityCVE-2026-3172cvecve-2026-3172
Published: Wed Feb 25 2026 (02/25/2026, 20:59:10 UTC)
Source: CVE Database V5
Product: pgvector

Description

Buffer overflow in parallel HNSW index build in pgvector 0.6.0 through 0.8.1 allows a database user to leak sensitive data from other relations or crash the database server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:29:49 UTC

Technical Analysis

CVE-2026-3172 is a vulnerability identified in the pgvector extension for PostgreSQL, specifically affecting versions 0.6.0 through 0.8.1. The issue arises from an integer underflow or wraparound condition during the parallel construction of the Hierarchical Navigable Small World (HNSW) index, a data structure used for efficient vector similarity searches. This integer underflow leads to a buffer overflow, which can be exploited by a database user with limited privileges to read sensitive data from other database relations that they should not have access to, violating confidentiality. Additionally, the overflow can cause the PostgreSQL server to crash, impacting availability. The vulnerability does not require user interaction but does require some level of database privileges (PR:L). The CVSS v3.1 score is 8.1, reflecting high severity due to the network attack vector, low attack complexity, and high impact on confidentiality and availability. No known exploits have been reported in the wild yet. The vulnerability is critical for organizations using pgvector for vector similarity search workloads, especially in AI, machine learning, and data analytics applications built on PostgreSQL. Since pgvector is an open-source extension, patching or upgrading to a fixed version once available is essential. Until patches are released, organizations should consider restricting access to pgvector features and monitoring database activity for anomalous behavior during index builds.

Potential Impact

The vulnerability allows an attacker with limited database privileges to leak sensitive data from other database relations, breaching confidentiality boundaries within the PostgreSQL environment. This can lead to unauthorized data disclosure, potentially exposing sensitive business or personal information. Additionally, the buffer overflow can cause the database server to crash, resulting in denial of service and impacting availability of critical applications relying on PostgreSQL and pgvector. Organizations using pgvector for AI/ML workloads or vector similarity search may face operational disruptions and data breaches. The attack can be launched remotely over the network without user interaction, increasing the risk of exploitation in multi-tenant or cloud environments. The scope includes all systems running vulnerable versions of pgvector, which may be widespread given the growing adoption of vector search extensions. The impact on integrity is low as the vulnerability does not allow data modification. However, the combined confidentiality and availability impacts make this a significant threat to database security and service continuity.

Mitigation Recommendations

1. Upgrade pgvector to the latest patched version once it is released by the maintainers to address CVE-2026-3172. 2. Until patches are available, restrict database user privileges to the minimum necessary, especially limiting access to pgvector features and the ability to build or rebuild HNSW indexes. 3. Monitor database logs and audit trails for unusual activity related to index builds or access patterns that could indicate exploitation attempts. 4. Implement network segmentation and firewall rules to limit access to PostgreSQL servers running pgvector, reducing exposure to untrusted users. 5. Consider disabling parallel HNSW index builds if configurable, or temporarily avoid using pgvector for vector similarity searches in sensitive environments. 6. Conduct internal penetration testing and code reviews focusing on pgvector usage to identify potential exploitation vectors. 7. Educate database administrators and developers about this vulnerability and the importance of applying updates promptly. 8. Employ runtime protections such as memory safety tools or database activity monitoring solutions to detect and prevent buffer overflow exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
PostgreSQL
Date Reserved
2026-02-24T22:42:24.733Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b0db7ef31ef0b54d928

Added to database: 2/25/2026, 9:35:09 PM

Last enriched: 3/5/2026, 11:29:49 AM

Last updated: 4/12/2026, 2:31:33 PM

Views: 486

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses