Critical Default Configuration Vulnerability in Bitnami Pgpool and Postgres-HA
On May 13, 2025, a critical vulnerability identified as CVE-2025-22248 was disclosed, affecting Bitnami’s pgpool Docker image and the bitnami/postgres-ha Kubernetes Helm chart. This flaw permits unauthenticated access to PostgreSQL databases due to insecure default user settings.
Understanding the Vulnerability
The issue stems from the inclusion of a user account named repmgr
, configured by default without authentication controls. This account is intended for internal streaming replication checks by Pgpool, controlled via the PGPOOL_SR_CHECK_USER
setting.
However, in affected configurations, this user is set to a trust level that does not require authentication. If Pgpool is exposed to external networks, an attacker could exploit this configuration to:
- Access the PostgreSQL database without authentication
- Potentially compromise data confidentiality, integrity, and availability
CVSS 4.0 Score and Impact
This vulnerability has been rated CRITICAL with a CVSS v4.0 base score of 9.4. The vector string is:
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
The scoring details reveal:
- Attack Vector: Adjacent network (e.g., same Kubernetes cluster)
- Privileges Required: None
- User Interaction: None
- Confidentiality/Integrity/Availability Impact: High
This configuration flaw exemplifies CWE-1188: Initialization of a Resource with an Insecure Default, which refers to the use of weak or unsafe defaults in software deployments.
Affected Versions
The following Bitnami components are impacted:
- bitnami/pgpool versions prior to
4.6.0-debian-12-r8
- bitnami/postgres-ha versions prior to
16.0.0
These defaults are present in both Docker and Kubernetes Helm chart deployments.
Remediation
Organizations using affected versions should:
- Update to the latest fixed versions of pgpool and postgres-ha
- Audit and secure all default database users
- Restrict external exposure of Pgpool where unnecessary
Bitnami has provided updated packages and advisories through their GitHub repository.
Conclusion
CVE-2025-22248 is a strong reminder of the dangers posed by insecure default configurations, especially in cloud-native environments. Administrators must not rely on default security settings and should proactively review deployment parameters to reduce risk.