PostgreSQL CVE-2026-6476: SQL Injection Grants Superuser Access
The National Vulnerability Database has disclosed CVE-2026-6476, a high-severity SQL injection vulnerability in PostgreSQL’s pg_createsubscriber function. This flaw allows an attacker with pg_create_subscription rights to execute arbitrary SQL commands as a superuser. The attack is not immediate; it takes effect the next time pg_createsubscriber runs.
This vulnerability impacts minor versions of PostgreSQL within major versions 17 and 18. Specifically, versions before PostgreSQL 18.4 and 17.10 are affected. Older PostgreSQL versions (before 17) are not susceptible to this specific flaw. The CVSS score for CVE-2026-6476 is 7.2 (HIGH), reflecting the significant impact of privilege escalation to superuser.
For defenders, this is a critical reminder that even administrative functions can harbor severe weaknesses. The attacker’s calculus here is clear: gain a foothold, then leverage existing, seemingly benign administrative permissions to escalate privileges and achieve full control over the database. This isn’t about external attackers; it’s about insider threats or compromised accounts with specific database privileges becoming superusers.
What This Means For You
- If your organization uses PostgreSQL versions 17 or 18, you must prioritize patching to at least 17.10 or 18.4 immediately. Audit your `pg_create_subscription` permissions to ensure only trusted, necessary accounts hold these rights. Any account with these privileges could be leveraged to gain superuser access, leading to full data compromise or manipulation.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-6476: PostgreSQL pg_createsubscriber SQL Injection
title: CVE-2026-6476: PostgreSQL pg_createsubscriber SQL Injection
id: scw-2026-05-14-ai-1
status: experimental
level: critical
description: |
Detects the execution of the pg_createsubscriber utility in PostgreSQL, which is the entry point for the CVE-2026-6476 SQL injection vulnerability. This allows an attacker with pg_create_subscription rights to execute arbitrary SQL as a superuser.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-6476/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: process_creation
detection:
selection:
Image|endswith:
- 'postgres.exe'
CommandLine|contains:
- 'pg_createsubscriber'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6476 | SQLi | PostgreSQL pg_createsubscriber |
| CVE-2026-6476 | SQLi | PostgreSQL versions 17.0 - 17.9 |
| CVE-2026-6476 | SQLi | PostgreSQL versions 18.0 - 18.3 |
| CVE-2026-6476 | Privilege Escalation | Attacker with pg_create_subscription rights can execute arbitrary SQL as a superuser |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 17:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.