Cyber Posture

CVE-2025-1094

High

Published: 13 February 2025

Published
13 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.8336 99.3th percentile
Risk Priority 66 60% EPSS · 20% KEV · 20% CVSS

Description

Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns. Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal. Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL. Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.

Security Summary

CVE-2025-1094 involves improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn(), enabling SQL injection in specific usage patterns. It affects PostgreSQL versions before 17.3, 16.7, 15.11, 14.16, and 13.19. Additionally, improper neutralization of quoting syntax in PostgreSQL command line utility programs creates a similar issue when client_encoding is BIG5 and server_encoding is EUC_TW or MULE_INTERNAL.

A database input provider can exploit this vulnerability to achieve SQL injection if an application uses the affected function results to construct input for psql, the PostgreSQL interactive terminal. Likewise, a source of command line arguments can trigger SQL injection under the specified encoding conditions. Remote attackers require no privileges (PR:N) and can target systems over the network (AV:N), though exploitation demands high complexity (AC:H). Successful attacks yield high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), as reflected in the CVSS 3.1 score of 8.1 (S:U), mapped to CWE-149.

The official PostgreSQL security advisory at https://www.postgresql.org/support/security/CVE-2025-1094/ and related announcements on oss-security and Debian LTS lists detail mitigations, primarily recommending upgrades to patched versions 17.3, 16.7, 15.11, 14.16, or 13.19.

Details

CWE(s)
CWE-149

References