Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3172: Integer Underflow or Wraparound in pgvector

0
High
VulnerabilityCVE-2026-3172cvecve-2026-3172
Published: Wed Feb 25 2026 (02/25/2026, 20:59:10 UTC)
Source: CVE Database V5
Product: pgvector

Description

Buffer overflow in parallel HNSW index build in pgvector 0.6.0 through 0.8.1 allows a database user to leak sensitive data from other relations or crash the database server.

AI-Powered Analysis

AILast updated: 02/25/2026, 21:49:47 UTC

Technical Analysis

CVE-2026-3172 is a vulnerability identified in the pgvector extension for PostgreSQL, specifically affecting versions 0.6.0 through 0.8.1. The flaw arises from an integer underflow or wraparound condition during the construction of the parallel Hierarchical Navigable Small World (HNSW) index, a data structure used for efficient similarity search in vector data. This integer underflow leads to a buffer overflow, which can be exploited by a database user with limited privileges to read sensitive data from other relations within the database or cause the database server to crash, resulting in denial of service. The vulnerability does not require user interaction but does require the attacker to have authenticated database access with privileges to build or manipulate the HNSW index. The CVSS v3.1 score is 8.1, reflecting high severity due to the network attack vector, low attack complexity, and significant confidentiality and availability impacts. No known exploits have been reported in the wild as of the publication date. The vulnerability highlights a critical flaw in memory handling during parallel index building in pgvector, which is increasingly used for vector similarity search in machine learning and AI applications integrated with PostgreSQL.

Potential Impact

The primary impact of CVE-2026-3172 is the potential leakage of sensitive data across database relations, which compromises confidentiality. Additionally, the buffer overflow can cause the PostgreSQL server to crash, resulting in denial of service and impacting availability. Organizations relying on pgvector for vector similarity search in critical applications may face data breaches or service outages. Since the vulnerability requires authenticated access, insider threats or compromised credentials could be leveraged to exploit this flaw. The disruption could affect data integrity indirectly by causing unexpected server crashes and potential data corruption during recovery. The vulnerability undermines trust in database security and could lead to regulatory and compliance issues if sensitive data is exposed. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation given the high severity score.

Mitigation Recommendations

To mitigate CVE-2026-3172, organizations should upgrade pgvector to a patched version once available, as no patch links are currently provided but are expected soon. Until a patch is released, restrict privileges to build or modify HNSW indexes to trusted database users only, minimizing the attack surface. Implement strict access controls and monitor database user activities for suspicious index-building operations. Employ database activity monitoring and anomaly detection to identify potential exploitation attempts. Consider disabling parallel HNSW index builds if feasible, or avoid using vulnerable pgvector versions in production environments. Regularly audit and rotate database credentials to reduce risk from compromised accounts. Additionally, maintain up-to-date backups and test recovery procedures to mitigate the impact of potential crashes. Engage with PostgreSQL and pgvector communities for updates and recommended best practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
PostgreSQL
Date Reserved
2026-02-24T22:42:24.733Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b0db7ef31ef0b54d928

Added to database: 2/25/2026, 9:35:09 PM

Last enriched: 2/25/2026, 9:49:47 PM

Last updated: 2/26/2026, 8:13:56 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats