Vulnerability Description
pgai is a Python library that transforms PostgreSQL into a retrieval engine for RAG and Agentic applications. Prior to commit 8eb3567, the pgai repository was vulnerable to an attack allowing the exfiltration of all secrets used in one workflow. In particular, the GITHUB_TOKEN with write permissions for the repository, allowing an attacker to tamper with all aspects of the repository, including pushing arbitrary code and releases. This issue has been patched in commit 8eb3567.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://github.com/timescale/pgai/commit/8eb356729c33560ce54b88b9a956960ad1e3ede
- https://github.com/timescale/pgai/pull/742
- https://github.com/timescale/pgai/security/advisories/GHSA-89qq-hgvp-x37m
FAQ
What is CVE-2025-52467?
CVE-2025-52467 is a vulnerability with a CVSS score of 9.1 (CRITICAL). pgai is a Python library that transforms PostgreSQL into a retrieval engine for RAG and Agentic applications. Prior to commit 8eb3567, the pgai repository was vulnerable to an attack allowing the exfi...
How severe is CVE-2025-52467?
CVE-2025-52467 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-52467?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.