We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-22248

[pgpool] Unauthenticated access to postgres through pgpool



Description

The bitnami/pgpool Docker image, and the bitnami/postgres-ha k8s chart, under default configurations, comes with an 'repmgr' user that allows unauthenticated access to the database inside the cluster. The PGPOOL_SR_CHECK_USER is the user that Pgpool itself uses to perform streaming replication checks against nodes, and should not be at trust level. This allows to log into a PostgreSQL database using the repgmr user without authentication. If Pgpool is exposed externally, a potential attacker could use this user to get access to the service. This is also present within the bitnami/postgres-ha Kubernetes Helm chart.

Reserved 2025-01-02 | Published 2025-05-13 | Updated 2025-05-13 | Assigner vmware


CRITICAL: 9.4CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Product status

Default status
affected

* before 4.6.0-debian-12-r8
affected

Default status
affected

* before 16.0.0
affected

References

github.com/...charts/security/advisories/GHSA-mx38-x658-5fwj

cve.org (CVE-2025-22248)

nvd.nist.gov (CVE-2025-22248)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-22248

Support options

Helpdesk Chat, Email, Knowledgebase