Skip to content

chore(deps): bump github.com/jackc/pgx/v5 from 5.9.0 to 5.9.2#16391

Merged
renovate[bot] merged 1 commit into
release-2.11from
renovate/release-2.11-go-github.com-jackc-pgx-v5-vulnerability
Apr 27, 2026
Merged

chore(deps): bump github.com/jackc/pgx/v5 from 5.9.0 to 5.9.2#16391
renovate[bot] merged 1 commit into
release-2.11from
renovate/release-2.11-go-github.com-jackc-pgx-v5-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Apr 24, 2026

This PR contains the following updates:

Package Type Change Age Adoption
github.com/jackc/pgx/v5 require v5.9.0v5.9.2 age adoption

pgx: SQL Injection via placeholder confusion with dollar quoted string literals

GHSA-j88v-2chj-qfwx

More information

Details

Impact

SQL Injection can occur when:

  1. The non-default simple protocol is used.
  2. A dollar quoted string literal is used in the SQL query.
  3. That string literal contains text that would be would be interpreted as a placeholder outside of a string literal.
  4. The value of that placeholder is controllable by the attacker.

e.g.

attackValue := `$tag$; drop table canary; --`
_, err = tx.Exec(ctx, `select $tag$ $1 $tag$, $1`, pgx.QueryExecModeSimpleProtocol, attackValue)

This is unlikely to occur outside of a contrived scenario.

Patches

The problem is resolved in v5.9.2.

Workarounds

Do not use the simple protocol to execute queries matching all the above conditions.

Severity

  • CVSS Score: 2.3 / 10 (Low)
  • Vector String: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

jackc/pgx (github.com/jackc/pgx/v5)

v5.9.2

Compare Source

v5.9.1

Compare Source


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate Bot added area/security Related to security issues, fixes, or improvements dependencies Pull requests that update a dependency file labels Apr 24, 2026
@renovate renovate Bot requested a review from a team as a code owner April 24, 2026 13:46
@renovate renovate Bot requested review from Automaat and slonka April 24, 2026 13:46
@renovate renovate Bot enabled auto-merge (squash) April 24, 2026 13:46
@renovate renovate Bot merged commit 351f017 into release-2.11 Apr 27, 2026
14 checks passed
@renovate renovate Bot deleted the renovate/release-2.11-go-github.com-jackc-pgx-v5-vulnerability branch April 27, 2026 10:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/security Related to security issues, fixes, or improvements dependencies Pull requests that update a dependency file release-2.11

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant