{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-6638","assignerOrgId":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","state":"PUBLISHED","assignerShortName":"PostgreSQL","dateReserved":"2026-04-19T19:58:21.650Z","datePublished":"2026-05-14T13:00:15.848Z","dateUpdated":"2026-05-14T15:28:30.735Z"},"containers":{"cna":{"providerMetadata":{"orgId":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","shortName":"PostgreSQL","dateUpdated":"2026-05-14T13:00:15.848Z"},"title":"PostgreSQL REFRESH PUBLICATION allows SQL injection via table name","descriptions":[{"lang":"en","value":"SQL injection in PostgreSQL logical replication ALTER SUBSCRIPTION ... REFRESH PUBLICATION allows a subscriber table creator to execute arbitrary SQL with the subscription's publication-side credentials.  The attack takes effect at the next REFRESH PUBLICATION.  Within major versions 16, 17, and 18, minor versions before PostgreSQL 18.4, 17.10, and 16.14 are affected.  Versions before PostgreSQL 16 are unaffected."}],"affected":[{"defaultStatus":"unaffected","product":"PostgreSQL","vendor":"n/a","versions":[{"lessThan":"18.4","status":"affected","version":"18","versionType":"rpm"},{"lessThan":"17.10","status":"affected","version":"17","versionType":"rpm"},{"lessThan":"16.14","status":"affected","version":"16","versionType":"rpm"}]}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-89","type":"CWE","description":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"}]}],"references":[{"url":"https://www.postgresql.org/support/security/CVE-2026-6638/"}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N","baseScore":3.7,"baseSeverity":"LOW"}}],"configurations":[{"lang":"en","value":"attacker has permission to create non-temporary subscriber objects with names appearing in the publication"},{"lang":"en","value":"victim has set origin=none on the subscription"}],"credits":[{"lang":"en","value":"The PostgreSQL project thanks Pavel Kohout, Aisle Research for reporting this problem."}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-14T15:28:21.916462Z","id":"CVE-2026-6638","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-14T15:28:30.735Z"}}]}}