First published: Wed Apr 16 2025(Updated: )
Password can be used past expiry in PgBouncer due to auth_query not taking into account Postgres its VALID UNTIL value, which allows an attacker to log in with an already expired password
Credit: f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
Affected Software | Affected Version | How to fix |
---|---|---|
debounce |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2291 is classified as a high severity vulnerability due to the risk of unauthorized access with expired passwords.
To fix CVE-2025-2291, update PgBouncer to the latest version where the issue is resolved.
CVE-2025-2291 affects PgBouncer installations that do not correctly enforce password expiry based on Postgres' VALID UNTIL value.
An attacker can exploit CVE-2025-2291 to log in using expired passwords, potentially gaining unauthorized access to the database.
Organizations should regularly update PgBouncer and review their authentication processes to ensure compliance with password expiry policies.