Critical Default Configuration Vulnerability in Bitnami Pgpool and Postgres-HA
On May 13, 2025, a critical vulnerability identified as CVE-2025-22248 was disclosed, affecting Bitnami’s pgpool Docker image and the bitnami/postgres-ha Kubernetes Helm chart. This flaw permits unauthenticated access to PostgreSQL databases due to insecure default user settings.
Understanding the Vulnerability
The issue stems from the inclusion of a user account named repmgr, configured by default without authentication controls. This account is intended for internal streaming replication checks by Pgpool, controlled via the PGPOOL_SR_CHECK_USER setting.
However, in affected configurations, this user is set to a trust level that does not require authentication. If Pgpool is exposed to external networks, an attacker could exploit this configuration to:
- Access the PostgreSQL database without authentication
 - Potentially compromise data confidentiality, integrity, and availability
 
CVSS 4.0 Score and Impact
This vulnerability has been rated CRITICAL with a CVSS v4.0 base score of 9.4. The vector string is:
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
The scoring details reveal:
- Attack Vector: Adjacent network (e.g., same Kubernetes cluster)
 - Privileges Required: None
 - User Interaction: None
 - Confidentiality/Integrity/Availability Impact: High
 
This configuration flaw exemplifies CWE-1188: Initialization of a Resource with an Insecure Default, which refers to the use of weak or unsafe defaults in software deployments.
Affected Versions
The following Bitnami components are impacted:
- bitnami/pgpool versions prior to 
4.6.0-debian-12-r8 - bitnami/postgres-ha versions prior to 
16.0.0 
These defaults are present in both Docker and Kubernetes Helm chart deployments.
Remediation
Organizations using affected versions should:
- Update to the latest fixed versions of pgpool and postgres-ha
 - Audit and secure all default database users
 - Restrict external exposure of Pgpool where unnecessary
 
Bitnami has provided updated packages and advisories through their GitHub repository.
Conclusion
CVE-2025-22248 is a strong reminder of the dangers posed by insecure default configurations, especially in cloud-native environments. Administrators must not rely on default security settings and should proactively review deployment parameters to reduce risk.