Skip to content

Commit 0aeabbc

Browse files
committed
Release v5.9.2
1 parent 60644f8 commit 0aeabbc

1 file changed

Lines changed: 20 additions & 0 deletions

File tree

CHANGELOG.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,23 @@
1+
# 5.9.2 (April 18, 2026)
2+
3+
Fix SQL Injection via placeholder confusion with dollar quoted string literals (GHSA-j88v-2chj-qfwx)
4+
5+
SQL injection can occur when:
6+
7+
1. The non-default simple protocol is used.
8+
2. A dollar quoted string literal is used in the SQL query.
9+
3. That query contains text that would be would be interpreted outside as a placeholder outside of a string literal.
10+
4. The value of that placeholder is controllable by the attacker.
11+
12+
e.g.
13+
14+
```go
15+
attackValue := `$tag$; drop table canary; --`
16+
_, err = tx.Exec(ctx, `select $tag$ $1 $tag$, $1`, pgx.QueryExecModeSimpleProtocol, attackValue)
17+
```
18+
19+
This is unlikely to occur outside of a contrived scenario.
20+
121
# 5.9.1 (March 22, 2026)
222

323
* Fix: batch result format corruption when using cached prepared statements (reported by Dirkjan Bussink)

0 commit comments

Comments
 (0)