Browse all 3 CVE security advisories affecting timescale. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Timescale is a time-series database extension for PostgreSQL designed for handling high-velocity IoT and application data. Historically, vulnerabilities have included remote code execution, SQL injection, and privilege escalation flaws, often stemming from improper input validation and access control weaknesses. While no major public security incidents have been widely reported, the three documented CVEs highlight potential risks in authentication mechanisms and data handling. The platform's security posture benefits from PostgreSQL's robust foundation but requires diligent patching due to its complex architecture and extended attack surface from specialized time-series functions.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-29089 | TimescaleDB uses untrusted search path during extension upgrade — timescaledbCWE-426 | 8.8 | High | 2026-03-06 |
| CVE-2023-25149 | TimescaleDB has incorrect access control — timescaledbCWE-284 | 8.8 | High | 2023-02-14 |
This page lists every published CVE security advisory associated with timescale. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.