CVE-2019-10127
PostgreSQL vulnerability analysis and mitigation

Overview

A vulnerability was discovered in PostgreSQL versions 11.x prior to 11.3, specifically affecting the Windows installer provided by BigSQL. The vulnerability was assigned CVE-2019-10127 and was disclosed on May 9, 2019. The issue affects the access control list (ACL) permissions of both the binary installation directory and the data directory, where the installer maintains inherited ACL entries instead of implementing proper security restrictions (PostgreSQL News).

Technical details

The vulnerability stems from improper permission settings during installation, where the BigSQL Windows installer fails to lock down the ACL permissions of both the PostgreSQL binary installation directory and the data directory. The vulnerability has been assigned a CVSS v3.1 score of 8.8 (HIGH) with the vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H, indicating local access requirements but high impact potential (NetApp Advisory).

Impact

The vulnerability's impact is significant in the default configuration. An attacker with both an unprivileged Windows account and an unprivileged PostgreSQL account can potentially execute arbitrary code using the PostgreSQL service account. Additionally, an attacker with only an unprivileged Windows account can read arbitrary data directory files, effectively bypassing database-imposed read access limitations, and can also delete certain data directory files (NVD).

Mitigation and workarounds

The vulnerability was fixed in PostgreSQL 11.3. The BigSQL installer has been updated to properly set permissions for these directories for both new and existing installations. For users who installed PostgreSQL on Windows using other methods, it is recommended to verify that PostgreSQL binary directories are writable only to trusted users and that data directories are only accessible to trusted users (PostgreSQL News).

Community reactions

The vulnerability was discovered and reported by Conner Jones, demonstrating the active security research community's involvement in PostgreSQL security. The PostgreSQL Global Development Group responded promptly by releasing fixes and coordinating with affected installation providers (PostgreSQL News).

Additional resources


SourceThis report was generated using AI

Related PostgreSQL vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-8715HIGH8.8
  • PostgreSQLPostgreSQL
  • postgresql:13::postgresql-test-rpm-macros
NoYesAug 14, 2025
CVE-2025-8714HIGH8.8
  • PostgreSQLPostgreSQL
  • postgresql14-plpython
NoYesAug 14, 2025
CVE-2025-12818MEDIUM5.9
  • PostgreSQLPostgreSQL
  • postgresql-18
NoYesNov 13, 2025
CVE-2025-12817LOW3.1
  • PostgreSQLPostgreSQL
  • postgresql:16::postgresql-upgrade-devel
NoYesNov 13, 2025
CVE-2025-8713LOW3.1
  • PostgreSQLPostgreSQL
  • postgresql13-llvmjit
NoYesAug 14, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management