pgx is a PostgreSQL driver and toolkit for Go. Prior to version 5.9.2, SQL injection can occur when the non-default simple protocol is used, a dollar quoted string literal is used in the SQL query, that string literal contains text that would be would be interpreted as a placeholder outside of a string literal, and the value of that placeholder is controllable by the attacker. This issue has been patched in version 5.9.2.
Metrics
Affected Vendors & Products
References
History
Fri, 08 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pgx is a PostgreSQL driver and toolkit for Go. Prior to version 5.9.2, SQL injection can occur when the non-default simple protocol is used, a dollar quoted string literal is used in the SQL query, that string literal contains text that would be would be interpreted as a placeholder outside of a string literal, and the value of that placeholder is controllable by the attacker. This issue has been patched in version 5.9.2. | |
| Title | pgx: SQL Injection via placeholder confusion with dollar quoted string literals | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T19:38:34.153Z
Reserved: 2026-04-22T15:11:54.671Z
Link: CVE-2026-41889
Updated: 2026-05-08T19:38:15.820Z
Status : Received
Published: 2026-05-08T17:16:31.040
Modified: 2026-05-08T17:16:31.040
Link: CVE-2026-41889
No data.
OpenCVE Enrichment
Updated: 2026-05-08T17:45:13Z