aiven-db-migrate is an Aiven database migration tool. Prior to 1.0.7, there is a privilege escalation vulnerability that allows a user to elevate to superuser inside PostgreSQL databases during a migration from an untrusted source server. By exploiting a lack of search_path restriction, an attacker can override pg_catalog and execute untrusted operators as a superuser. This vulnerability is fixed in 1.0.7.
References
Configurations
History
21 Aug 2025, 21:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/aiven/aiven-db-migrate/commit/39517dc55720055d93262033b142a365f5bf92c5 - Patch | |
References | () https://github.com/aiven/aiven-db-migrate/security/advisories/GHSA-hmvf-93r4-36f9 - Vendor Advisory | |
Summary |
|
|
First Time |
Aiven
Aiven aiven-db-migrate |
|
CPE | cpe:2.3:a:aiven:aiven-db-migrate:*:*:*:*:*:*:*:* |
18 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-18 17:15
Updated : 2025-08-21 21:40
NVD link : CVE-2025-55282
Mitre link : CVE-2025-55282
CVE.ORG link : CVE-2025-55282
JSON object : View
Products Affected
aiven
- aiven-db-migrate
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')