{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-22248","assignerOrgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","state":"PUBLISHED","assignerShortName":"vmware","dateReserved":"2025-01-02T04:30:19.929Z","datePublished":"2025-05-13T09:13:30.613Z","dateUpdated":"2025-05-13T13:10:31.070Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","packageName":"bitnami/pgpool","product":"Bitnami","vendor":"VMware","versions":[{"lessThan":"4.6.0-debian-12-r8","status":"affected","version":"*","versionType":"git"}]},{"defaultStatus":"affected","packageName":"bitnami/postgres-ha","product":"Bitnami","vendor":"VMware","versions":[{"lessThan":"16.0.0","status":"affected","version":"*","versionType":"git"}]}],"datePublic":"2025-05-13T08:09:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">The </span><code>bitnami/pgpool</code><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;Docker image, and the </span><code>bitnami/postgres-ha</code><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;k8s chart, under default configurations, comes with an 'repmgr' user that allows unauthenticated access to the database inside the cluster.&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">The </span><code>PGPOOL_SR_CHECK_USER</code><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;is the user that Pgpool itself uses to perform streaming replication checks against nodes, and should not be at </span><code>trust</code><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;level. This allows to log into a PostgreSQL database using the </span><code>repgmr</code><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;user without authentication. If Pgpool is exposed externally, a potential attacker could use this user to get access to the service. This is also present within the </span><code>bitnami/postgres-ha</code><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;Kubernetes Helm chart.</span></span><br>"}],"value":"The bitnami/pgpool Docker image, and the bitnami/postgres-ha k8s chart, under default configurations, comes with an 'repmgr' user that allows unauthenticated access to the database inside the cluster. The PGPOOL_SR_CHECK_USER is the user that Pgpool itself uses to perform streaming replication checks against nodes, and should not be at trust level. This allows to log into a PostgreSQL database using the repgmr user without authentication. If Pgpool is exposed externally, a potential attacker could use this user to get access to the service. This is also present within the bitnami/postgres-ha Kubernetes Helm chart."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":9.4,"baseSeverity":"CRITICAL","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"}]}],"providerMetadata":{"orgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","shortName":"vmware","dateUpdated":"2025-05-13T09:13:30.613Z"},"references":[{"url":"https://github.com/bitnami/charts/security/advisories/GHSA-mx38-x658-5fwj"}],"source":{"discovery":"UNKNOWN"},"title":"[pgpool] Unauthenticated access to postgres through pgpool","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-1188","lang":"en","description":"CWE-1188 Initialization of a Resource with an Insecure Default"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-13T13:10:00.979591Z","id":"CVE-2025-22248","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-13T13:10:31.070Z"}}]}}