TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, operators). If the search_path includes user-writable schemas a malicious user can create functions in that schema that shadow builtin postgres functions and will be called instead of the postgres functions leading to arbitrary code execution during extension upgrade. This issue has been patched in version 2.25.2.
History

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Timescale
Timescale timescaledb
Vendors & Products Timescale
Timescale timescaledb

Sat, 07 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-427
References
Metrics threat_severity

None

threat_severity

Important


Fri, 06 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, operators). If the search_path includes user-writable schemas a malicious user can create functions in that schema that shadow builtin postgres functions and will be called instead of the postgres functions leading to arbitrary code execution during extension upgrade. This issue has been patched in version 2.25.2.
Title TimescaleDB uses untrusted search path during extension upgrade
Weaknesses CWE-426
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T17:57:17.941Z

Reserved: 2026-03-03T21:54:06.707Z

Link: CVE-2026-29089

cve-icon Vulnrichment

Updated: 2026-03-06T17:57:12.804Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-06T18:16:19.967

Modified: 2026-03-09T13:35:34.633

Link: CVE-2026-29089

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-06T17:06:34Z

Links: CVE-2026-29089 - Bugzilla