| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6270-1 | postgresql-17 security update |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.postgresql.org/support/security/CVE-2026-6638/ |
|
Thu, 14 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Postgresql
Postgresql postgresql |
|
| Vendors & Products |
Postgresql
Postgresql postgresql |
Thu, 14 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQL injection in PostgreSQL logical replication ALTER SUBSCRIPTION ... REFRESH PUBLICATION allows a subscriber table creator to execute arbitrary SQL with the subscription's publication-side credentials. The attack takes effect at the next REFRESH PUBLICATION. Within major versions 16, 17, and 18, minor versions before PostgreSQL 18.4, 17.10, and 16.14 are affected. Versions before PostgreSQL 16 are unaffected. | |
| Title | PostgreSQL REFRESH PUBLICATION allows SQL injection via table name | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: PostgreSQL
Published:
Updated: 2026-05-14T15:28:30.735Z
Reserved: 2026-04-19T19:58:21.650Z
Link: CVE-2026-6638
Updated: 2026-05-14T15:28:27.447Z
Status : Awaiting Analysis
Published: 2026-05-14T14:16:25.937
Modified: 2026-05-14T16:21:23.190
Link: CVE-2026-6638
No data.
OpenCVE Enrichment
Updated: 2026-05-14T15:00:12Z
Debian DSA