PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-6473 Postgresql CVE debrief

CVE-2026-6473 is a high-severity PostgreSQL server vulnerability caused by integer wraparound in multiple server features. An unprivileged database user may be able to trigger an undersized allocation followed by an out-of-bounds write. Depending on the affected path and deployment, this can lead to arbitrary code execution as the operating system user running PostgreSQL. The NVD record also notes that in applications passing gigabyte-scale user inputs to the relevant database functions, the application input provider may cause a segmentation fault. Affected versions are those before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23.

Vendor
Postgresql
Product
Unknown
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-14
Original CVE updated
2026-05-18
Advisory published
2026-05-14
Advisory updated
2026-05-18

Who should care

PostgreSQL administrators, managed database operators, application teams that expose PostgreSQL functions to large user-controlled inputs, and security teams responsible for database patching and version hygiene.

Technical summary

The NVD describes an integer wraparound issue (CWE-190) in multiple PostgreSQL server features. The flaw can cause the server to compute an allocation that is too small, then perform an out-of-bounds write. The vulnerability is reachable by an unprivileged database user and is rated CVSS 3.1 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Vulnerable version ranges are all releases before 14.23, 15.18, 16.14, 17.10, and 18.4.

Defensive priority

High. This is a remotely reachable database-server flaw with low attack complexity and potential for code execution, so patching should be prioritized quickly across all exposed PostgreSQL instances.

Recommended defensive actions

  • Upgrade PostgreSQL to a fixed release: 18.4, 17.10, 16.14, 15.18, or 14.23, or later.
  • Inventory all PostgreSQL deployments, including embedded, replicated, and managed-service instances, and verify exact server versions.
  • Review any application code that passes very large user-controlled inputs into PostgreSQL functions and reduce or validate input sizes where feasible.
  • Restrict who can create or execute database functions and monitor for unusual database-user activity while patching is in progress.
  • Consult the PostgreSQL security advisory for CVE-2026-6473 and apply vendor guidance specific to your deployment.

Evidence notes

Grounded in the supplied NVD record and its linked PostgreSQL security advisory reference. The description states integer wraparound can cause undersized allocation and out-of-bounds write, potentially enabling arbitrary code execution as the OS user running PostgreSQL. NVD marks the issue as CWE-190 and rates it CVSS 3.1 8.8. Version bounds are explicitly listed in the supplied CPE criteria and description.

Official resources

CVE published on 2026-05-14 and last modified on 2026-05-18. The supplied timeline indicates the same publication and modification timestamps for the source record; these dates are used here as the disclosure context.