CVE-2024-27304

9.8 CRITICAL
Published: March 06, 2024 Modified: December 04, 2025

Description

pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8
Source: security-advisories@github.com
Vendor Advisory
https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv
Source: security-advisories@github.com
Vendor Advisory
https://www.youtube.com/watch?v=Tfg1B8u1yvE
Source: security-advisories@github.com
Press/Media Coverage
https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

13 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
2.2%
84th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

pgproto3_project pgx_project