Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-2360
PUBLISHED
More InfoOfficial Page
Assigner-PostgreSQL
Assigner Org ID-f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
View Known Exploited Vulnerability (KEV) details
Published At-11 Feb, 2026 | 17:47
Updated At-11 Feb, 2026 | 18:29
Rejected At-
▼CVE Numbering Authority (CNA)
Improper search_path protection in PostgreSQL Anonymizer 2.5 allows any user to gain superuser privileges in PostgreSQL 14

PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a custom operator in the public schema and place malicious code in that operator. This operator will later be executed with superuser privileges when the extension is created. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version. With PostgreSQL 15 and later, the creation permission on the public schema is revoked by default and this exploit can only be achieved if a superuser adds a new schema in her/his own search_path and grants the CREATE privilege on that schema to untrusted users, both actions being clearly discouraged by the PostgreSQL documentation. The problem is resolved in PostgreSQL Anonymizer 3.0.1 and further versions

Affected Products
Vendor
DALIBO
Product
PostgreSQL Anonymizer
Default Status
unaffected
Versions
Affected
  • From 1 before 3.0.1 (rpm)
Problem Types
TypeCWE IDDescription
CWECWE-427Uncontrolled Search Path Element
Type: CWE
CWE ID: CWE-427
Description: Uncontrolled Search Path Element
Metrics
VersionBase scoreBase severityVector
3.18.0HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Do not allow users to create new objects in the public schema by running the following command in all of your databases: REVOKE CREATE ON SCHEMA public FROM PUBLIC;

Exploits

Credits

The PostgreSQL Anonymizer project thanks Daniel Bakker for reporting this problem.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://gitlab.com/dalibo/postgresql_anonymizer/-/blob/latest/NEWS.md
N/A
https://gitlab.com/dalibo/postgresql_anonymizer/-/issues/616
N/A
https://www.postgresql.org/docs/current/ddl-schemas.html#DDL-SCHEMAS-PATH
N/A
Hyperlink: https://gitlab.com/dalibo/postgresql_anonymizer/-/blob/latest/NEWS.md
Resource: N/A
Hyperlink: https://gitlab.com/dalibo/postgresql_anonymizer/-/issues/616
Resource: N/A
Hyperlink: https://www.postgresql.org/docs/current/ddl-schemas.html#DDL-SCHEMAS-PATH
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found