2025.03.5 Release
Docker tag: quay.io/pganalyze/enterprise:v2025.03.5
Release date: December 23, 2025
Notes
- This is a patch release on top of 2025.03.0, 2025.03.1, 2025.03.2, 2025.03.3 and 2025.03.4
- This release does not have any new database migrations, and is easy to apply (or rollback)
- If you're upgrading from a release before 2025.03.0, be sure to read those release notes, and follow the recommended upgrade steps
Features
- Support for Postgres 18
- Support for Plan Statistics captured with pg_stat_plans
- Update bundled collector from 0.66.2 to 0.67.0
- See the collector changelog for the full details
- Add support for converting text plans collected with EXPLAIN (COSTS OFF) to JSON
- Alerts & Check-Up: Relax
pganalyze:no-alertcheck- Previously, to skip Active Query and Blocking Query alerts for a
specific query, the string
pganalyze:no-alertwas required to be embedded in a properly formatted comment. Now, the string can occur anywhere in the query text to avoid an issue being created
- Previously, to skip Active Query and Blocking Query alerts for a
specific query, the string
Bugfixes
- Enterprise self-check: Correctly handle
MAILER_SSL=noneconfiguration- This configuration would previously fail to pass the self-check, despite working in practice.
- Fix over-counting table sizes in table overview stats per database
- Skip pg_query truncation when query text is over 10k characters long
- Drop unused GeoIP library dependency
- Correctly parse
X-Forwarded-Forheader in snapshot API - Avoid internal errors when external redirects encounter unauthorized routes
Security
- Redact statement text on server-side for old collector versions
- A bug between collector versions 0.60.0 and 0.66.3 caused the collector to not correctly redact STATEMENT lines when the full line was redacted, due to an off-by-one bug in the replacement code. This is fixed in 0.67.0 but in case the collector has not been upgraded yet, this removes any STATEMENT lines on the server side
- Package security upgrades (Rails CVE-2025-24293, Rails CVE-2025-55193,
PyO3 RUSTSEC-2025-0020, brace-expansion CVE-2025-5889,
unset-value SNYK-JS-UNSETVALUE-2400660, aws-s3-sdk CVE-2025-14762,
rack CVE-2025-61780, rack CVE-2025-61919,
rack CVE-2025-61770, rack CVE-2025-61771,
rack CVE-2025-61772, uri CVE-2025-61594,
rexml CVE-2025-58767)
- These vulnerabilities are not exploitable in our assessment, but may show up in dependency scanners
- Routine security updates to packages in the base image
Couldn't find what you were looking for or want to talk about something specific?
Start a conversation with us →