Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Operation Ramz Seizes 53 Servers: Cyber Linked Scams
May 19, 2026
Mini Shai-Hulud Supply Chain Attack Compromises Packages Compromised
May 19, 2026
Critical PostgreSQL Flaws Allow Code Execution & SQL
May 19, 2026
Home/CyberSecurity News/Critical PostgreSQL Flaws Allow Code Execution & SQL
CyberSecurity News

Critical PostgreSQL Flaws Allow Code Execution & SQL

The PostgreSQL Global Development Group has released critical security updates. These patches address 11 vulnerabilities across all supported branches, including arbitrary code execution and several...

Marcus Rodriguez
Marcus Rodriguez
May 19, 2026 3 Min Read
1 0

The PostgreSQL Global Development Group has released critical security updates. These patches address 11 vulnerabilities across all supported branches, including arbitrary code execution and several SQL injection flaws.

Table Of Content

  • PostgreSQL Vulnerabilities
  • Code Execution via refint Module
  • SQL Injection in Replication Components
  • Other Critical Memory and Client‑Side Issues

PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 have been released as security and maintenance updates.

These minor versions address 11 CVEs plus more than 60 bugs reported over the last few months, making this a high‑priority release for production databases.

All supported branches from 14 through 18 are affected by at least some of the issues, so simply running a newer major version does not remove the risk.

Admins can upgrade in place by stopping PostgreSQL and updating binaries; dump/restore, or pg_upgrade is not required for these minor updates.

PostgreSQL Vulnerabilities

Code Execution via refint Module

CVE‑2026‑6637 is one of the most serious bugs, located in the refint module used to enforce referential integrity.

A stack buffer overflow allows an unprivileged database user to execute arbitrary code as the operating system account running PostgreSQL, which means a full server compromise from a database‑level foothold.

A separate attack scenario arises when an application exposes a user‑controlled column as a refint-cascade primary key and allows users to update it.

In this case, a crafted primary key update can trigger SQL injection, allowing the attacker to execute arbitrary SQL with the database privileges of the updating role.

Vulnerability Impact
CVE-2026-6472 Privilege bypass and arbitrary SQL execution
CVE-2026-6473 Potential RCE and memory corruption
CVE-2026-6474 Server memory information leak
CVE-2026-6475 Arbitrary file overwrite vulnerability
CVE-2026-6476 SQL injection with superuser execution
CVE-2026-6477 Client-side code execution risk
CVE-2026-6478 MD5 credential timing leak
CVE-2026-6479 SSL/GSS denial-of-service flaw
CVE-2026-6575 Limited memory disclosure issue
CVE-2026-6637 Stack overflow and SQL injection
CVE-2026-6638 SQL injection in logical replication

SQL Injection in Replication Components

Logical replication features contain multiple SQL injection paths that can be abused for privilege escalation.

CVE‑2026‑6476 affects pg_createsubscriber and lets an attacker with pg_create_subscription rights inject SQL that runs with superuser privileges when pg_createsubscriber is invoked.

CVE‑2026‑6638 resides in ALTER SUBSCRIPTION … REFRESH PUBLICATION.

A subscriber table creator can craft table names that cause arbitrary SQL to execute using the publication side’s credentials, the next time REFRESH PUBLICATION runs.

According to the latest release from PostgreSQL, these flaws primarily affect PostgreSQL 16–18 environments using logical replication.

Other Critical Memory and Client‑Side Issues

Several vulnerabilities affect memory safety, denial-of-service, and client tools.

CVE‑2026‑6473 describes integer wraparound issues that cause undersized memory allocations and out‑of‑bounds writes, leading to segmentation faults when attackers supply crafted inputs.

CVE‑2026‑6477 affects the libpq client library by allowing unsafe use of PQfn in large-object helper functions such as lo_export() and lo_read().

A server superuser can send oversized responses that overwrite stack memory in client tools like psql and pg_dump, potentially leading to client‑side code execution.

Backup utilities are also impacted: CVE‑2026‑6475 allows pg_basebackup (plain format) and pg_rewind to follow symbolic links and overwrite arbitrary local files chosen by the origin superuser, such as shell profiles.

In addition, PostgreSQL 14 is scheduled to reach end‑of‑life on November 12, 2026, after which it will no longer receive fixes.

Organizations still running 14 should both apply 14.23 now and start planning a migration to a newer supported branch.

Given the combination of code execution, SQL injection, memory corruption, and client‑side risks, these updates should be treated as urgent, especially for internet‑exposed or multi‑tenant PostgreSQL deployments.

Teams should prioritize upgrading to 18.4, 17.10, 16.14, 15.18, or 14.23 and review their use of refint, logical replication, and client tooling as part of their hardening efforts.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVESecurityVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Critical Apache Flink Vulnerability Enables Remote code execution

Next Post

Mini Shai-Hulud Supply Chain Attack Compromises Packages Compromised

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Compromised GitHub Action Exfiltrates Workflow Credentials to
May 19, 2026
Microsoft Edge Fails to Load Saved Passwords at Startup
May 19, 2026
Attackers Exfiltrate Files via Cloudflare Storage Endpoints
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us