Search for vulnerabilities
Vulnerability details: VCID-y8yz-9q93-aaaq
Vulnerability ID VCID-y8yz-9q93-aaaq
Aliases CVE-2023-2454
Summary schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.
Status Published
Exploitability 0.5
Weighted Severity 6.5
Risk 3.2
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 7.2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json
cvssv3.1 7.2 https://access.redhat.com/security/cve/CVE-2023-2454
ssvc Track https://access.redhat.com/security/cve/CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00260 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00260 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00260 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00285 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00285 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00298 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00298 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00298 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00298 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00298 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00298 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00298 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00298 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00298 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00298 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.00320 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.01607 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
epss 0.05555 https://api.first.org/data/v1/epss?cve=CVE-2023-2454
cvssv3.1 6 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 7.2 https://nvd.nist.gov/vuln/detail/CVE-2023-2454
cvssv3.1 7.2 https://nvd.nist.gov/vuln/detail/CVE-2023-2454
cvssv3.1 7.2 https://security.netapp.com/advisory/ntap-20230706-0006/
ssvc Track https://security.netapp.com/advisory/ntap-20230706-0006/
cvssv3 7.2 https://www.postgresql.org/support/security/CVE-2023-2454/
cvssv3.1 7.2 https://www.postgresql.org/support/security/CVE-2023-2454/
ssvc Track https://www.postgresql.org/support/security/CVE-2023-2454/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json
https://access.redhat.com/security/cve/CVE-2023-2454
https://api.first.org/data/v1/epss?cve=CVE-2023-2454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://security.netapp.com/advisory/ntap-20230706-0006/
https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/
https://www.postgresql.org/support/security/CVE-2023-2454/
2207568 https://bugzilla.redhat.com/show_bug.cgi?id=2207568
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
CVE-2023-2454 https://nvd.nist.gov/vuln/detail/CVE-2023-2454
RHSA-2023:3714 https://access.redhat.com/errata/RHSA-2023:3714
RHSA-2023:4313 https://access.redhat.com/errata/RHSA-2023:4313
RHSA-2023:4327 https://access.redhat.com/errata/RHSA-2023:4327
RHSA-2023:4527 https://access.redhat.com/errata/RHSA-2023:4527
RHSA-2023:4535 https://access.redhat.com/errata/RHSA-2023:4535
RHSA-2023:4539 https://access.redhat.com/errata/RHSA-2023:4539
RHSA-2023:5269 https://access.redhat.com/errata/RHSA-2023:5269
USN-6104-1 https://usn.ubuntu.com/6104-1/
USN-6230-1 https://usn.ubuntu.com/6230-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/security/cve/CVE-2023-2454
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/ Found at https://access.redhat.com/security/cve/CVE-2023-2454
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-2454
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-2454
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://security.netapp.com/advisory/ntap-20230706-0006/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/ Found at https://security.netapp.com/advisory/ntap-20230706-0006/
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Found at https://www.postgresql.org/support/security/CVE-2023-2454/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/ Found at https://www.postgresql.org/support/security/CVE-2023-2454/
Exploit Prediction Scoring System (EPSS)
Percentile 0.47649
EPSS Score 0.00244
Published At April 15, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.