CVE-2025-12967
📋 TL;DR
This vulnerability in AWS Wrappers for Amazon Aurora PostgreSQL allows low-privilege authenticated database users to escalate privileges to the rds_superuser role. Attackers can create crafted functions that execute with permissions of other RDS users, potentially gaining full database control. Organizations using affected AWS wrapper libraries for Aurora PostgreSQL are impacted.
💻 Affected Systems
- AWS JDBC Wrapper
- AWS Go Wrapper
- AWS NodeJS Wrapper
- AWS Python Wrapper
- AWS PGSQL ODBC driver
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise where attackers gain rds_superuser privileges, allowing them to read/modify all data, create/delete databases, install malicious extensions, and potentially pivot to other AWS resources.
Likely Case
Data exfiltration, privilege escalation within the database, and unauthorized access to sensitive information stored in the affected Aurora PostgreSQL instances.
If Mitigated
Limited impact if proper network segmentation, least privilege access controls, and monitoring are in place, though the vulnerability still presents significant risk.
🎯 Exploit Status
Requires authenticated database access and knowledge of PostgreSQL function creation. The advisory suggests the attack involves creating crafted functions that execute with elevated permissions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: AWS JDBC Wrapper v2.6.5, AWS Go Wrapper 2025-10-17, AWS NodeJS Wrapper v2.0.1, AWS Python Wrapper v1.4.0, AWS PGSQL ODBC driver v1.0.1
Vendor Advisory: https://aws.amazon.com/security/security-bulletins/AWS-2025-028/
Restart Required: Yes
Instructions:
1. Identify all applications using affected AWS wrapper libraries. 2. Update each wrapper to the patched version. 3. Restart applications/services using the updated libraries. 4. Test functionality after update.
🔧 Temporary Workarounds
Restrict Database User Privileges
allApply strict least privilege principles to database users, removing CREATE FUNCTION privileges from non-administrative users.
REVOKE CREATE ON SCHEMA public FROM [username];
REVOKE CREATE ON DATABASE [dbname] FROM [username];
🧯 If You Can't Patch
- Implement strict network access controls to limit database connections to trusted sources only
- Enhance database monitoring for suspicious function creation and privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check the version of AWS wrapper libraries in use by examining application dependencies or package manifests.
Check Version:
Check library version through application dependency management tools (e.g., npm list, pip show, go mod, Maven/Gradle dependencies)
Verify Fix Applied:
Confirm updated wrapper versions are deployed and verify applications function correctly with the new versions.
📡 Detection & Monitoring
Log Indicators:
- Unusual CREATE FUNCTION statements from non-admin users
- Privilege escalation attempts to rds_superuser
- Suspicious function execution patterns
Network Indicators:
- Unusual database connection patterns from unexpected sources
SIEM Query:
source="postgresql" AND ("CREATE FUNCTION" OR "rds_superuser") AND user!="postgres"
🔗 References
- https://aws.amazon.com/security/security-bulletins/AWS-2025-028/
- https://github.com/aws/aws-advanced-go-wrapper/releases/tag/release-2025-10-17
- https://github.com/aws/aws-advanced-go-wrapper/security/advisories/GHSA-7wq2-32h4-9hc9
- https://github.com/aws/aws-advanced-jdbc-wrapper/releases/tag/2.6.5
- https://github.com/aws/aws-advanced-jdbc-wrapper/security/advisories/GHSA-7xw4-g7mm-r4hh
- https://github.com/aws/aws-advanced-nodejs-wrapper/releases/tag/2.0.1
- https://github.com/aws/aws-advanced-nodejs-wrapper/security/advisories/GHSA-8wj8-cfxr-9374
- https://github.com/aws/aws-advanced-python-wrapper/releases/tag/1.4.0
- https://github.com/aws/aws-advanced-python-wrapper/security/advisories/GHSA-4jvf-wx3f-2x8q
- https://github.com/aws/aws-pgsql-odbc/releases/tag/1.0.1
- https://github.com/aws/aws-pgsql-odbc/security/advisories/GHSA-q327-fgm8-7mxf