CVE-2026-2007
Published: 12 February 2026
Summary
CVE-2026-2007 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Postgresql Postgresql. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the heap buffer overflow by requiring timely remediation through vendor patches for the affected PostgreSQL pg_trgm extension.
Implements memory protections such as address space layout randomization and non-executable heap memory to prevent exploitation of the heap buffer overflow.
Requires validation of input strings to pg_trgm functions to reject or sanitize crafted inputs that trigger the buffer overflow.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Heap buffer overflow in exposed PostgreSQL extension directly enables remote exploitation of a public-facing database application (T1190) and potential privilege escalation via memory corruption (T1068).
NVD Description
Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of…
more
attacks that lead to privilege escalation. PostgreSQL 18.1 and 18.0 are affected.
Deeper analysisAI
CVE-2026-2007 is a heap buffer overflow vulnerability (CWE-122) in the pg_trgm extension of PostgreSQL. It affects versions 18.1 and 18.0. The flaw enables a database user to trigger unknown impacts by supplying a crafted input string, with the attacker having limited control over the byte patterns written into the heap overflow.
A database user can exploit this vulnerability remotely over the network with low attack complexity, no user interaction, and no privileges required (CVSS:3.1 score of 8.2; AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H). Successful exploitation may result in high availability impact and low integrity impact, and while exact outcomes remain unknown, privilege escalation has not been ruled out due to the nature of the overflow.
The official PostgreSQL security advisory at https://www.postgresql.org/support/security/CVE-2026-2007/ details available patches and mitigation guidance for addressing this issue.
Details
- CWE(s)