Windows installer runs executables from uncontrolled directories

The Windows installer for PostgreSQL invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights.

The PostgreSQL project thanks Hou JingYi (@hjy79425575) for reporting this problem.

Version Information

Affected Version Fixed In Fix Published
12 12.3 May 14, 2020
11 11.8 May 14, 2020
10 10.13 May 14, 2020
9.6 9.6.18 May 14, 2020
9.5 9.5.22 May 14, 2020

For more information about PostgreSQL versioning, please visit the versioning page.

CVSS 3.0

Overall Score 6.7
Component packaging
Vector AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

Reporting Security Vulnerabilities

If you wish to report a new security vulnerability in PostgreSQL, please send an email to

For reporting non-security bugs, please see the Report a Bug page.