CVE-2025-0218

EUVD-2025-1553
When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
PostgreSQLCNA
5.5 MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 24%
Affected Products (NVD)
VendorProductVersion
pgadminpgagent
𝑥
< 4.2.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pgagent
bookworm
no-dsa
bullseye
vulnerable
bullseye (security)
4.0.0-8+deb11u1
fixed
forky
4.2.3-5
fixed
sid
4.2.3-5
fixed
trixie
4.2.3-2
fixed