{"id":78475,"date":"2026-05-14T17:46:25","date_gmt":"2026-05-14T14:16:25","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/cve-2026-6638-postgresql-refresh-publication-allows-sql-injection-via-table-name\/"},"modified":"2026-05-14T17:46:25","modified_gmt":"2026-05-14T14:16:25","slug":"cve-2026-6638-postgresql-refresh-publication-allows-sql-injection-via-table-name","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2026-6638-postgresql-refresh-publication-allows-sql-injection-via-table-name\/","title":{"rendered":"CVE-2026-6638 &#8211; PostgreSQL REFRESH PUBLICATION allows SQL injection via table name"},"content":{"rendered":"<p>CVE ID :CVE-2026-6638<\/p>\n<p>  Published : May 14, 2026, 2:16 p.m. | 42\u00a0minutes ago<\/p>\n<p>  Description :SQL injection in PostgreSQL logical replication ALTER SUBSCRIPTION &#8230; REFRESH PUBLICATION allows a subscriber table creator to execute arbitrary SQL with the subscription&#8217;s publication-side credentials.  The attack takes effect at the next REFRESH PUBLICATION.  Within major versions 16, 17, and 18, minor versions before PostgreSQL 18.4, 17.10, and 16.14 are affected.  Versions before PostgreSQL 16 are unaffected.<\/p>\n<p>  Severity: 3.7 | LOW<\/p>\n<p>  Visit the link for more details, such as CVSS details, affected products, timeline, and more&#8230;\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE ID :CVE-2026-6638 Published : May 14, 2026, 2:16 p.m. | 42\u00a0minutes ago Description :SQL injection in PostgreSQL logical replication ALTER SUBSCRIPTION &#8230; REFRESH PUBLICATION allows a subscriber table creator to execute arbitrary SQL with the subscription&#8217;s publication-side credentials. The attack takes effect at the next REFRESH PUBLICATION. Within major versions 16, 17, and 18, &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-78475","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=78475"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78475\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=78475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=78475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=78475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}