Pgpool-II provided by PgPool Global Development Group contains an authentication bypass by primary weakness vulnerability. if the vulnerability is exploited, an attacker may be able to log in to the system as an arbitrary user, allowing them to read or tamper with data in the database, and/or disable the database.
History

Mon, 19 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 19 May 2025 07:30:00 +0000

Type Values Removed Values Added
Description Pgpool-II provided by PgPool Global Development Group contains an authentication bypass by primary weakness vulnerability. if the vulnerability is exploited, an attacker may be able to log in to the system as an arbitrary user, allowing them to read or tamper with data in the database, and/or disable the database.
Weaknesses CWE-305
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published: 2025-05-19T07:14:45.304Z

Updated: 2025-05-19T16:02:56.831Z

Reserved: 2025-04-30T08:26:53.970Z

Link: CVE-2025-46801

cve-icon Vulnrichment

Updated: 2025-05-19T16:02:50.683Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-19T08:15:21.840

Modified: 2025-05-19T13:35:20.460

Link: CVE-2025-46801

cve-icon Redhat

No data.