docs/content/stable/secure/vulnerability-disclosure-policy.md
An important part of Yugabyte's strategy for building a secure platform for our users is vulnerability reporting. We value working with the broader security research community and understand that fostering that relationship will help Yugabyte improve its own security posture. We take vulnerabilities very seriously regardless of source, and strongly encourage people to report security vulnerabilities privately to our security team before disclosing them in a public forum. Our goal is to surface vulnerabilities and resolve them privately before they can be exploited.
{{<lead link="/stable/faq/penetration-testing/">}} For recommendations on penetration testing with YugbayteDB, see Penetration testing. {{</lead>}}
In scope We commit to investigate and address any reported issues, and request that you use the following process for the reporting of security vulnerabilities in the following products:
Out of Scope
We will keep all information you provide to us confidential.
We assure you that we will not initiate legal action against researchers who are acting in good faith and adhering to this process.
Report the Concern. If you have any security concerns or would like to report undisclosed security vulnerabilities in our products or services, please email us at [email protected]. Note that we do not accept bug reports at this address.
Include Details. Please provide as much information as you can about the potential vulnerability, including but not limited to the following:
Vulnerabilities in Other Open Source Projects. We incorporate software from other open source projects, and welcome vulnerability reports for those. However, you should also report those vulnerabilities directly to the affected project.
Use Common Sense. Please use common sense when looking for security issues with our products. Attacking or compromising Yugabyte users' installations, or attacks on our infrastructure are not permitted.
We will promptly investigate any reported issue. In certain cases, we may work privately with you to resolve the vulnerability. We may choose not to disclose information publicly while we investigate and mitigate any risk.
Upon validation and appropriate mitigation (if any) of the risk, we will alert affected customers, and add the CVE to the following list.
| Product | Name | Affected versions | Fixed in | Status |
|---|---|---|---|---|
| YugabyteDB | {{<cve "CVE-2023-6001">}} | from v2.0 through v2.18.3.0 | v2.18.4.0 | Resolved |
| YugabyteDB | {{<cve "CVE-2023-6002">}} | from v2.0 through v2.14.13.0, v2.16.7.0, and v2.18.3.0 | v2.14.14.0, v2.16.8.0, v2.18.4.0 and later | Resolved |
| YugabyteDB | {{<cve "CVE-2023-4640">}} | from v2.0 through v2.17.3.0 | v2.17.4.0 | Resolved |
| YugabyteDB | {{<cve "CVE-2023-0745">}} | from v2.0 through v2.13.0.0 | v2.14.0.0 | Resolved |
| YugabyteDB | {{<cve "CVE-2023-0575">}} | from v2.0 through v2.14.0.0 | v2.15.0.0 | Resolved |
| YugabyteDB | {{<cve "CVE-2023-0574">}} | from v2.0 through v2.13.0.0 | v2.14.0.0 | Resolved |
| YugabyteDB | {{<cve "CVE-2022-37397">}} | v2.6.1.0 | v2.6.1.1 | Resolved |
| YugabyteDB | {{<cve "CVE-2024-0006">}} | from v2.18.0.0 through v2.18.8.0, | ||
| from {{<release "2.20.0.0">}} through {{<release "2.20.2.2">}}, | ||||
| {{<release "2024.1.0.0">}} | v2.18.9.0, {{<release "2.20.2.3">}}, {{<release "2024.1.1.0">}} and later | Resolved | ||
| YugabyteDB | {{<cve "CVE-2024-6895">}} | from v2.14.0.0 through v2.14.16.0, | ||
| from v2.16.0.0 through v2.16.8.0, | ||||
| from v2.18.0.0 through v2.18.8.0, | ||||
| from {{<release "2.20.0.0">}} through {{<release "2.20.4.0">}} | {{<release "2.20.5.0">}} and later | Resolved | ||
| YugabyteDB | {{<cve "CVE-2024-6908">}} | from v2.14.0.0 through v2.14.16.0, | ||
| from v2.16.0.0 through v2.16.8.0, | ||||
| from v2.18.0.0 through v2.18.6.0, | ||||
| from {{<release "2.20.0.0">}} through {{<release "2.20.2.0">}} | v2.18.7.0, {{<release "2.20.3.0">}} and later | Resolved | ||
| YugabyteDB Anywhere | {{<cve "CVE-2024-11165">}} | from {{<release "2.20.0.0">}} through {{<release "2.20.6.0">}}, | ||
| {{<release "2.23.0.0">}}, | ||||
| from {{<release "2024.1.0.0">}} through {{<release "2024.1.2.0">}} | {{<release "2.20.7.0">}}, {{<release "2.23.1.0">}}, {{<release "2024.1.3.0">}} and later | Resolved | ||
| YugabyteDB Anywhere | {{<cve "CVE-2024-11193">}} | from {{<release "2.20.0.0">}} through {{<release "2.20.6.0">}}, | ||
| {{<release "2.23.0.0">}}, | ||||
| from {{<release "2024.1.0.0">}} through {{<release "2024.1.2.0">}} | {{<release "2.20.7.0">}}, {{<release "2.23.1.0">}}, {{<release "2024.1.3.0">}} and later | Resolved | ||
| YugabyteDB | {{<cve "CVE-2025-8862">}} | from {{<release "2024.1.0.0">}} through {{<release "2024.1.2.0">}}, | ||
| from {{<release "2.20.0.0">}} through {{<release "2.20.6.0">}}, | ||||
| {{<release "2.23.0.0">}} | {{<release "2024.1.3.0">}}, {{<release "2.20.7.0">}}, {{<release "2.23.1.0">}} and later | Resolved | ||
| YugabyteDB | {{<cve "CVE-2025-8863">}} | from {{<release "2024.1.0.0">}} through {{<release "2024.1.2.0">}}, | ||
| from {{<release "2.20.0.0">}} through {{<release "2.20.6.0">}}, | ||||
| {{<release "2.23.0.0">}} | {{<release "2024.1.3.0">}}, {{<release "2.20.7.0">}}, {{<release "2.23.1.0">}} and later | Resolved | ||
| YugabyteDB Anywhere | {{<cve "CVE-2025-8864">}} | from {{<release "2024.1.0.0">}} through {{<release "2024.1.2.0">}}, | ||
| from {{<release "2.20.0.0">}} through {{<release "2.20.6.0">}}, | ||||
| {{<release "2.23.0.0">}} | {{<release "2024.1.3.0">}}, {{<release "2.20.7.0">}}, {{<release "2.23.1.0">}} and later | Resolved | ||
| YugabyteDB | {{<cve "CVE-2025-8865">}} | from {{<release "2.20.0.0">}} through {{<release "2.20.6.0">}}, | ||
| {{<release "2.23.0.0">}}, | ||||
| from {{<release "2024.1.0.0">}} through {{<release "2024.1.2.0">}} | {{<release "2.20.7.0">}}, {{<release "2.23.1.0">}}, {{<release "2024.1.3.0">}} and later | Resolved | ||
| YugabyteDB Anywhere | {{<cve "CVE-2025-8866">}} | from {{<release "2.20.0.0">}} through {{<release "2.20.8.0">}}, | ||
| from {{<release "2024.1.0.0">}} through {{<release "2024.1.2.0">}} | ||||
| from {{<release "2024.2.0.0">}} through {{<release "2024.2.2.4">}} | {{<release "2.20.9.0">}}, {{<release "2024.1.3.0">}}, {{<release "2024.2.3.0">}} and later | Resolved | ||
| YugabyteDB Anywhere | {{<cve "CVE-2026-1966">}} | from {{<release "2025.1.0.0">}} through {{<release "2025.1.0.1">}} | ||
| from {{<release "2024.2.0.0">}} through {{<release "2024.2.5.1">}} | {{<release "2025.2.0.0">}}, {{<release "2025.1.1.0">}}, {{<release "2024.2.6.0">}} and later | Resolved |
{{< note title="Note" >}}
Our release notes contain up-to-date information on security vulnerabilities and available patches.
{{< /note >}}
YugabyteDB relies on PostgreSQL, and the following CVEs have been addressed in the PostgreSQL code base.
Note that this policy covers only vulnerabilities in the query layer of PostgreSQL. Yugabyte does not publish or disclose any other third-party (supply chain) vulnerabilities. The focus is to ensure security and integrity of the PostgreSQL query layer.
| Product | Name | Fixed in YugabyteDB version | Status |
|---|---|---|---|
| PostgreSQL 15 (YSQL) | {{<cve "CVE-2023-39418">}} | Not applicable: YugabyteDB does not have functionality that could expose this vulnerability. | |
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10127">}} | Not applicable: YugabyteDB only runs on Linux, this vulnerability is Windows-specific. | |
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10128">}} | Not applicable: YugabyteDB only runs on Linux, this vulnerability is Windows-specific. | |
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10129">}} | v2.7.1 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10130">}} | v2.12.11.0, v2.14.3.0, v2.15.4.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10164">}} | v2.12.11.0, v2.14.3.0, v2.15.3.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10208">}} | v2.12.11.0, v2.14.3.0, v2.15.4.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10209">}} | v2.12.11.0, v2.14.3.0, v2.15.4.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10210">}} | Not applicable: YugabyteDB only runs on Linux, this vulnerability is Windows-specific. | |
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10211">}} | Not applicable: YugabyteDB only runs on Linux, this vulnerability is Windows-specific. | |
| PostgreSQL (YSQL) | {{<cve "CVE-2019-3466">}} | Not applicable: pg_ctlcluster is not included in installation. | |
| PostgreSQL (YSQL) | {{<cve "CVE-2020-10733">}} | Not applicable: YugabyteDB only runs on Linux, this vulnerability is Windows-specific. | |
| PostgreSQL (YSQL) | {{<cve "CVE-2020-14349">}} | Not applicable: YugabyteDB does not use logical replication. | |
| PostgreSQL (YSQL) | {{<cve "CVE-2020-14350">}} | v2.12.11.0, v2.14.5.0, v2.16.0.0, v2.17.1.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2020-1720">}} | Resolved | |
| PostgreSQL (YSQL) | {{<cve "CVE-2020-25694">}} | v2.7.1 or later | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2020-25695">}} | v2.12.0.0, v2.14.0.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2020-25696">}} | v2.12.11.0, v2.14.3.0, v2.15.4.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2021-23214">}} | v2.8.1.0, v2.6.7.0, v2.11.1.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2021-23222">}} | v2.8.1.0, v2.6.7.0, v2.11.1.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2021-32027">}} | v2.7.0.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2021-32028">}} | v2.7.2.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2021-32029">}} | v2.14.15.0, v2.18.6.0, {{<release "2.20.2.0">}}, {{<release "2.21.1.0">}} | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2021-3393">}} | v2.17.1.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2021-3677">}} | v2.7.3.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2021-43766">}} | v2.12.0.0, v2.14.0.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2021-43767">}} | Resolved | |
| PostgreSQL (YSQL) | {{<cve "CVE-2022-1552">}} | v2.12.0.0, v2.14.0.0, v2.15.1.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2022-2625">}} | v2.12.10.0, v2.14.2.0, v2.15.3.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2023-2454">}} | v2.18.1.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2023-2455">}} | v2.14.10.2, v2.16.5.0, v2.18.0.0, {{<release "2.20.0.0">}} | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2023-32305">}} | Not applicable: aiven-extras is not included in installation. | |
| PostgreSQL (YSQL) | {{<cve "CVE-2023-39417">}} | {{<release "2.20.1.0">}}, v2.14.15.0, v2.16.9.0, v2.18.5.0 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2023-5868">}} | v2.14.17.x, v2.18.8.x, {{<release "2.20.6.x">}}, {{<release "2.23.0.0">}}, v2024.2 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2023-5869">}} | v2.14.17.x, v2.18.8.x, {{<release "2.20.6.x">}}, {{<release "2.23.0.0">}}, v2024.2 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2023-5870">}} | v2.14.17.x, v2.18.8.x, {{<release "2.20.6.x">}}, {{<release "2.23.0.0">}}, v2024.2 | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2024-10978">}} | {{<release "2024.2.6.x">}} | Resolved |
| PostgreSQL (YSQL) | {{<cve "CVE-2024-10979">}} | Not applicable: PL/Perl extension is not included in installation. |