TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, operators). If the search_path includes user-writable schemas a malicious user can create functions in that schema that shadow builtin postgres functions and will be called instead of the postgres functions leading to arbitrary code execution during extension upgrade. This issue has been patched in version 2.25.2.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 07 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-427
References
Metrics threat_severity

None

threat_severity

Important


Fri, 06 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, operators). If the search_path includes user-writable schemas a malicious user can create functions in that schema that shadow builtin postgres functions and will be called instead of the postgres functions leading to arbitrary code execution during extension upgrade. This issue has been patched in version 2.25.2.
Title TimescaleDB uses untrusted search path during extension upgrade
Weaknesses CWE-426
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T17:57:17.941Z

Reserved: 2026-03-03T21:54:06.707Z

Link: CVE-2026-29089

cve-icon Vulnrichment

Updated: 2026-03-06T17:57:12.804Z

cve-icon NVD

Status : Received

Published: 2026-03-06T18:16:19.967

Modified: 2026-03-06T18:16:19.967

Link: CVE-2026-29089

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-06T17:06:34Z

Links: CVE-2026-29089 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses