{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T15:54:42.414","vulnerabilities":[{"cve":{"id":"CVE-2025-55283","sourceIdentifier":"security-advisories@github.com","published":"2025-08-18T17:15:30.700","lastModified":"2025-08-21T21:38:40.753","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"aiven-db-migrate is an Aiven database migration tool. Prior to 1.0.7, there is a privilege escalation vulnerability that allows elevation to superuser inside PostgreSQL databases during a migration from an untrusted source server. The vulnerability stems from psql executing commands embedded in a dump from the source server. This vulnerability is fixed in 1.0.7."},{"lang":"es","value":"aiven-db-migrate es una herramienta de migración de bases de datos de Aiven. Antes de la versión 1.0.7, existía una vulnerabilidad de escalada de privilegios que permitía la elevación a superusuario dentro de bases de datos PostgreSQL durante una migración desde un servidor de origen no confiable. La vulnerabilidad se origina cuando psql ejecuta comandos incrustados en un volcado del servidor de origen. Esta vulnerabilidad se corrigió en la versión 1.0.7."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aiven:aiven-db-migrate:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.7","matchCriteriaId":"AAD53924-058B-4328-879E-AB48753FF0BC"}]}]}],"references":[{"url":"https://github.com/aiven/aiven-db-migrate/commit/36f6c7f7d06216975f625da0a1cb514253c4b3df","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/aiven/aiven-db-migrate/security/advisories/GHSA-wqhc-grmj-fjvg","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}