We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-2506



Description

When pglogical attempts to replicate data, it does not verify it is using a replication connection, which means a user with CONNECT access to a database configured for replication can execute the pglogical command to obtain read access to replicated tables. When pglogical runs it should verify it is running on a replication connection but does not perform this check. This vulnerability was introduced in the pglogical 3.x codebase, which is proprietary to EDB. The same code base has been integrated into BDR/PGD 4 and 5. To exploit the vulnerability the attacker needs at least CONNECT permissions to a database configured for replication and must understand a number of pglogical3/BDR specific commands and be able to decode the binary protocol.

Reserved 2025-03-18 | Published 2025-05-22 | Updated 2025-05-22 | Assigner EDB


MEDIUM: 5.3CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
affected

3 before 3.7.26-ELS
affected

Default status
affected

4 before 4.3.8-ELS
affected

Default status
affected

5 before 5.8.0
affected

References

www.enterprisedb.com/docs/security/advisories/cve20252506/

cve.org (CVE-2025-2506)

nvd.nist.gov (CVE-2025-2506)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-2506

Support options

Helpdesk Chat, Email, Knowledgebase