Overview
On August 14, 2025, PostgreSQL released emergency security patches addressing three critical vulnerabilities — CVE-2025-8713, CVE-2025-8714, and CVE-2025-8715 — affecting PostgreSQL versions 13 through 17.
- Issues ranged from data leakage via optimizer statistics to arbitrary OS-level command execution during
pg_dump/pg_restoreworkflows. - Two of the flaws present a serious Remote Code Execution (RCE) threat, making this one of the most severe PostgreSQL advisories in recent years.
Vulnerability Details
1. CVE-2025-8713 – Optimizer Statistics Data Leakage
- CVSS Score: 3.1 (Low)
- Impact: Optimizer statistics leaked restricted data via crafted queries.
- Root Cause: Incomplete fixes from past issues (CVE-2017-7484, CVE-2019-10130) left residual gaps.
- Practical Risk: Attackers could bypass ACLs and expose histograms & most-common-values lists, weakening data confidentiality.
- Affected Versions: PostgreSQL 13–17 (before 13.22, 14.19, 15.14, 16.10, 17.6).
2. CVE-2025-8714 – Arbitrary Code Execution via pg_dump
- CVSS Score: 8.8 (High)
- Impact: Malicious dumps could execute OS-level commands during
pg_restore. - Root Cause:
pg_dumpandpg_restorefailed to sanitizepsqlmeta-commands embedded in dumps. - Threat Model: Particularly critical when restoring backups from untrusted or external sources.
- Affected Versions: PostgreSQL 13–17 (before fixed releases).
3. CVE-2025-8715 – Newline Injection in Object Names
- CVSS Score: 8.8 (High)
- Impact: Improper newline handling allowed SQL injection / OS command execution during restore.
- Root Cause: Regression of an older vulnerability (CVE-2012-0868).
- Exploitation: Crafting specially named objects could trigger malicious execution in
pg_restore. - Affected Versions: PostgreSQL 13–17 (before fixed releases).
⚠️ Risk Summary
- CVE-2025-8713 → Primarily data exposure risk.
- CVE-2025-8714 & CVE-2025-8715 → High-severity Remote Code Execution (RCE).
Most at risk:
- Organizations frequently exchanging or restoring database backups (multi-tenant, SaaS, or DevOps workflows).
- Environments restoring backups from third-party/untrusted databases.
🛡 Recommendations
1. Upgrade Immediately
Patch to one of the fixed versions:
- 17.6, 16.10, 15.14, 14.19, or 13.22
- ⚠️ PostgreSQL 13 users should plan migration — support ends November 13, 2025.
2. Reindex After Upgrade
- Run reindexing on BRIN indexes using
numeric_minmax_multi_opsto prevent residual errors.
3. Harden Superuser Privileges
- Restrict superuser roles to trusted administrators only.
- Audit roles regularly and remove dormant accounts.
4. Secure Backup Workflows
- Treat pg_dump/pg_restore files as executable code.
- Never restore from unverified or untrusted sources.
5. Enforce Least Privilege
- Apply Role-Based Access Controls (RBAC) across all environments.
- Audit access policies to ensure minimum exposure.
Conclusion
The PostgreSQL August 2025 patch set addresses one data leak and two RCE-class threats with wide-ranging enterprise impact.
- CVE-2025-8714 and CVE-2025-8715 are especially dangerous for organizations relying on backup restoration, data migration, or cloud-native PostgreSQL workflows.
- Out-of-date PostgreSQL systems expose both data and host operating systems to compromise.
➡️ Action Required:
- Upgrade to the latest patched versions immediately.
- Harden backup/restoration processes against untrusted inputs.
- Limit database superuser privileges and enforce RBAC rigorously.
Keeping PostgreSQL patched is not optional — it is critical to ensuring data integrity and resilience against exploitation.
Mine2 Team
The MINE2 team consists of cybersecurity experts, researchers, and engineers dedicated to advancing threat detection and cyber deception technologies.
Recent Articles
Need Security Help?
Protect your organization with MINE2's cyber deception platform.


