


Perceptive Security
SOC/SIEM Consultancy

TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses …
Published:
5 maart 2026 om 23:00:00
Alert date:
6 maart 2026 om 19:01:54
Source:
nvd.nist.gov
Database & Storage
TimescaleDB versions 2.23.0 to 2.25.1 contain a privilege escalation vulnerability that allows arbitrary code execution during extension upgrades. The vulnerability exploits PostgreSQL's search_path setting, where malicious users can create functions in user-writable schemas that shadow built-in PostgreSQL functions. When the extension upgrade process runs, these malicious functions are executed instead of legitimate PostgreSQL functions, leading to arbitrary code execution. The issue affects the time-series database extension for PostgreSQL and has been patched in version 2.25.2.
Technical details
Mitigation steps:
Affected products:
TimescaleDB
PostgreSQL
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-29089
https://github.com/timescale/timescaledb/commit/9a8f7f8bdeb99e6abae0786ffe526791a8628ce3
https://github.com/timescale/timescaledb/pull/9331
https://github.com/timescale/timescaledb/releases/tag/2.25.2
https://github.com/timescale/timescaledb/security/advisories/GHSA-vgp2-jj5c-828m
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
