Windows installer writes superuser password to unprotected temporary file

The EnterpriseDB Windows installer writes a password to a temporary file in its installation directory, creates initial databases, and deletes the file. During those seconds while the file exists, a local attacker can read the PostgreSQL superuser password from the file.

The PostgreSQL project thanks Noah Misch for reporting this problem.

Version Information

Affected Version Fixed In Fix Published
11 11.5 Aug. 8, 2019
10 10.10 Aug. 8, 2019
9.6 9.6.15 Aug. 8, 2019
9.5 9.5.19 Aug. 8, 2019
9.4 9.4.24 Aug. 8, 2019

For more information about PostgreSQL versioning, please visit the versioning page.

CVSS 3.0

Overall Score 6.7
Component packaging
Vector AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

Reporting Security Vulnerabilities

If you wish to report a new security vulnerability in PostgreSQL, please send an email to

For reporting non-security bugs, please see the Report a Bug page.