{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T15:16:47.560","vulnerabilities":[{"cve":{"id":"CVE-2026-29089","sourceIdentifier":"security-advisories@github.com","published":"2026-03-06T18:16:19.967","lastModified":"2026-03-18T18:50:46.093","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, operators). If the search_path includes user-writable schemas a malicious user can create functions in that schema that shadow builtin postgres functions and will be called instead of the postgres functions leading to arbitrary code execution during extension upgrade. This issue has been patched in version 2.25.2."},{"lang":"es","value":"TimescaleDB es una base de datos de series temporales para análisis en tiempo real de alto rendimiento empaquetada como una extensión de Postgres. Desde la versión 2.23.0 hasta la 2.25.1, PostgreSQL utiliza la configuración search_path para localizar objetos de base de datos no calificados (tablas, funciones, operadores). Si el search_path incluye esquemas escribibles por el usuario, un usuario malintencionado puede crear funciones en ese esquema que ocultan funciones integradas de postgres y serán llamadas en lugar de las funciones de postgres, lo que lleva a la ejecución de código arbitrario durante la actualización de la extensión. Este problema ha sido parcheado en la versión 2.25.2."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.0,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-426"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:timescale:timescaledb:*:*:*:*:*:*:*:*","versionStartIncluding":"2.23.0","versionEndExcluding":"2.25.2","matchCriteriaId":"70D5A15A-A908-4113-B8BA-AC0A17166F76"}]}]}],"references":[{"url":"https://github.com/timescale/timescaledb/commit/9a8f7f8bdeb99e6abae0786ffe526791a8628ce3","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/timescale/timescaledb/pull/9331","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/timescale/timescaledb/releases/tag/2.25.2","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/timescale/timescaledb/security/advisories/GHSA-vgp2-jj5c-828m","source":"security-advisories@github.com","tags":["Mitigation","Vendor Advisory"]}]}}]}