{"id":"CVE-2023-2454","details":"schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.","aliases":["BIT-postgresql-2023-2454"],"modified":"2026-04-16T00:06:42.031866869Z","published":"2023-06-09T19:15:09.253Z","related":["ALSA-2023:3714","ALSA-2023:4327","ALSA-2023:4527","ALSA-2023:4535","ALSA-2023:4539","ALSA-2023:5269","SUSE-SU-2023:2198-1","SUSE-SU-2023:2199-1","SUSE-SU-2023:2200-1","SUSE-SU-2023:2201-1","SUSE-SU-2023:2202-1","SUSE-SU-2023:2205-1","SUSE-SU-2023:2206-1","SUSE-SU-2023:2207-1","SUSE-SU-2023:2219-1","openSUSE-SU-2024:12929-1","openSUSE-SU-2024:12930-1","openSUSE-SU-2024:12931-1","openSUSE-SU-2024:12932-1","openSUSE-SU-2024:12933-1","openSUSE-SU-2024:14360-1","openSUSE-SU-2025:15580-1"],"references":[{"type":"ADVISORY","url":"https://www.postgresql.org/support/security/CVE-2023-2454/"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-2454"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230706-0006/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"11.0"},{"fixed":"11.20"}]},{"events":[{"introduced":"12.0"},{"fixed":"12.15"}]},{"events":[{"introduced":"13.0"},{"fixed":"13.11"}]},{"events":[{"introduced":"14.0"},{"fixed":"14.8"}]},{"events":[{"introduced":"15.0"},{"fixed":"15.3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-2454.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}