Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-2361

Summary
Assigner-PostgreSQL
Assigner Org ID-f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
Published At-11 Feb, 2026 | 17:48
Updated At-11 Feb, 2026 | 18:24
Rejected At-
Credits

Improper search_path protection in PostgreSQL Anonymizer 2.5 allows any user with create privilege to gain superuser privileges

PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a temporary view based on a function containing malicious code. When the anon.get_tablesample_ratio function is then called, the malicious code is executed with superuser privileges. This privilege elevation can be exploited by users having the CREATE privilege in PostgreSQL 15 and later. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version because the creation permission on the public schema is granted by default. The problem is resolved in PostgreSQL Anonymizer 3.0.1 and further versions

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:PostgreSQL
Assigner Org ID:f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
Published At:11 Feb, 2026 | 17:48
Updated At:11 Feb, 2026 | 18:24
Rejected At:
▼CVE Numbering Authority (CNA)
Improper search_path protection in PostgreSQL Anonymizer 2.5 allows any user with create privilege to gain superuser privileges

PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a temporary view based on a function containing malicious code. When the anon.get_tablesample_ratio function is then called, the malicious code is executed with superuser privileges. This privilege elevation can be exploited by users having the CREATE privilege in PostgreSQL 15 and later. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version because the creation permission on the public schema is granted by default. The problem is resolved in PostgreSQL Anonymizer 3.0.1 and further versions

Affected Products
Vendor
DALIBO
Product
PostgreSQL Anonymizer
Default Status
unaffected
Versions
Affected
  • From 1 before 3.0.1 (rpm)
Problem Types
TypeCWE IDDescription
CWECWE-427Uncontrolled Search Path Element
Type: CWE
CWE ID: CWE-427
Description: Uncontrolled Search Path Element
Metrics
VersionBase scoreBase severityVector
3.18.0HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Drop the anon.get_tablesample_ratio function. It is obsolete.

Exploits

Credits

The PostgreSQL Anonymizer project thanks Daniel Bakker for reporting this problem.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://gitlab.com/dalibo/postgresql_anonymizer/-/blob/latest/NEWS.md
N/A
https://gitlab.com/dalibo/postgresql_anonymizer/-/issues/617
N/A
Hyperlink: https://gitlab.com/dalibo/postgresql_anonymizer/-/blob/latest/NEWS.md
Resource: N/A
Hyperlink: https://gitlab.com/dalibo/postgresql_anonymizer/-/issues/617
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
Published At:11 Feb, 2026 | 18:16
Updated At:12 Feb, 2026 | 15:11

PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a temporary view based on a function containing malicious code. When the anon.get_tablesample_ratio function is then called, the malicious code is executed with superuser privileges. This privilege elevation can be exploited by users having the CREATE privilege in PostgreSQL 15 and later. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version because the creation permission on the public schema is granted by default. The problem is resolved in PostgreSQL Anonymizer 3.0.1 and further versions

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.0HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-427Secondaryf86ef6dc-4d3a-42ad-8f28-e6d5547a5007
CWE ID: CWE-427
Type: Secondary
Source: f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://gitlab.com/dalibo/postgresql_anonymizer/-/blob/latest/NEWS.mdf86ef6dc-4d3a-42ad-8f28-e6d5547a5007
N/A
https://gitlab.com/dalibo/postgresql_anonymizer/-/issues/617f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
N/A
Hyperlink: https://gitlab.com/dalibo/postgresql_anonymizer/-/blob/latest/NEWS.md
Source: f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
Resource: N/A
Hyperlink: https://gitlab.com/dalibo/postgresql_anonymizer/-/issues/617
Source: f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

3Records found

CVE-2026-2360
Matching Score-10
Assigner-PostgreSQL
ShareView Details
Matching Score-10
Assigner-PostgreSQL
CVSS Score-8||HIGH
EPSS-Not Assigned
Published-11 Feb, 2026 | 17:47
Updated-12 Feb, 2026 | 15:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper search_path protection in PostgreSQL Anonymizer 2.5 allows any user to gain superuser privileges in PostgreSQL 14

PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a custom operator in the public schema and place malicious code in that operator. This operator will later be executed with superuser privileges when the extension is created. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version. With PostgreSQL 15 and later, the creation permission on the public schema is revoked by default and this exploit can only be achieved if a superuser adds a new schema in her/his own search_path and grants the CREATE privilege on that schema to untrusted users, both actions being clearly discouraged by the PostgreSQL documentation. The problem is resolved in PostgreSQL Anonymizer 3.0.1 and further versions

Action-Not Available
Vendor-DALIBO
Product-PostgreSQL Anonymizer
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2024-2338
Matching Score-8
Assigner-PostgreSQL
ShareView Details
Matching Score-8
Assigner-PostgreSQL
CVSS Score-8||HIGH
EPSS-0.05% / 14.46%
||
7 Day CHG~0.00%
Published-08 Mar, 2024 | 20:07
Updated-12 Feb, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL Injection in PostgreSQL Anonymizer 1.2 allows table owner to gain superuser privileges via masking rule

PostgreSQL Anonymizer v1.2 contains a SQL injection vulnerability that allows a user who owns a table to elevate to superuser when dynamic masking is enabled. PostgreSQL Anonymizer enables users to set security labels on tables to mask specified columns. There is a flaw that allows complex expressions to be provided as a value. This expression is then later used as it to create the masked views leading to SQL Injection. If dynamic masking is enabled, this will lead to privilege escalation to superuser after the label is created. Users that don't own a table, especially masked users cannot exploit this vulnerability. The problem is resolved in v1.3.

Action-Not Available
Vendor-daliboDALIBOdalibo
Product-anonymizerPostgreSQL Anonymizerpostgresql_anonymizer
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-2339
Matching Score-8
Assigner-PostgreSQL
ShareView Details
Matching Score-8
Assigner-PostgreSQL
CVSS Score-8||HIGH
EPSS-0.05% / 15.75%
||
7 Day CHG~0.00%
Published-08 Mar, 2024 | 20:07
Updated-12 Feb, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in PostgreSQL Anonymizer 1.2 allows table owner to gain superuser privileges via masking rule

PostgreSQL Anonymizer v1.2 contains a vulnerability that allows a user who owns a table to elevate to superuser. A user can define a masking function for a column and place malicious code in that function. When a privileged user applies the masking rules using the static masking or the anonymous dump method, the malicious code is executed and can grant escalated privileges to the malicious user. PostgreSQL Anonymizer v1.2 does provide a protection against this risk with the restrict_to_trusted_schemas option, but that protection is incomplete. Users that don't own a table, especially masked users cannot exploit this vulnerability. The problem is resolved in v1.3.

Action-Not Available
Vendor-daliboDALIBOdalibo
Product-anonymizerPostgreSQL Anonymizerpostgresql_anonymizer
CWE ID-CWE-20
Improper Input Validation
Details not found