[Japanese]

JVNDB-2025-000031

Pgpool-II vulnerable to authentication bypass by primary weakness

Overview

Pgpool-II provided by PgPool Global Development Group contains the following vulnerability.
  • Authentication bypass by primary weakness (CWE-305) - CVE-2025-46801

PgPool Global Development Group reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and PgPool Global Development Group coordinated under the Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 9.8 (Critical) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High


CVSS V4 Severity:
Base Metrics:9.3 (Critical) [IPA Score]
  • Attack Vector(AV): Network
  • Attack Complexity(AC): Low
  • Attack Requirements (AT): None
  • Privileges Required (PR): None
  • User Interaction (UI): None
  • Vulnerable System Impact Metrics
  • Confidentiality (VC):High
  • Integrity (VI):High
  • Availability (VA):High
  • Subsequent System Impact Metrics
  • Confidentiality (SC):None
  • Integrity (SI):None
  • Availability (SA):None
Affected Products


PgPool Global Development Group
  • Pgpool-II 4.6.0
  • Pgpool-II 4.5.0 to 4.5.6
  • Pgpool-II 4.4.0 to 4.4.11
  • Pgpool-II 4.3.0 to 4.3.14
  • Pgpool-II 4.2.0 to 4.2.21
  • Pgpool-II All versions of 4.1 series
  • Pgpool-II All versions of 4.0 series

This vulnerability only affects systems that meet any of the conditions in patterns below:
    Pattern 1: All of the following conditions must be met.
  • Password authentication method is configured in pool_hba.conf
  • allow_clear_text_frontend_auth = off
  • Victim user's password is not set in pool_passwd
  • scram-sha-256 or md5 authentication method is configured in pg_hba.conf
    Pattern 2: All of the following conditions must be met.
  • enable_pool_hba = off
  • One of the authentication methods among password, pam, and ldap is configured in pg_hba.conf
    Pattern 3: All of the following conditions must be met.
  • Pgpool-II is running in raw mode (backend_clustering_mode = 'raw')
  • md5 authentication method is configured in pool_hba.conf
  • allow_clear_text_frontend_auth = off
  • Victim user's password is stored as plaintext or AES format in pool_passwd
  • One of the authentication methods among password, pam, and ldap is configured in pg_hba.conf
Impact

An attacker may be able to log in to the system as an arbitrary user, allowing them to read or tamper with data in the database, and/or disable the database.
Solution

[Update the Software]
Apply the appropriate updates for the respective versions according to the information provided by the developer.
The developer has released the following versions that address the vulnerability.
  • Pgpool-II 4.6.1
  • Pgpool-II 4.5.7
  • Pgpool-II 4.4.12
  • Pgpool-II 4.3.15
  • Pgopol-II 4.2.22

The developer recommends that users should upgrade the software to the above versions, but as 4.0 and 4.1 series are no longer supported (End-of-Support), no updates/patches will be provided for them.
Vendor Information

PgPool Global Development Group
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2025-46801
References

  1. JVN : JVN#06238225
Revision History

  • [2025/05/15]
      Web page was published