CVE-2025-2945

CRITICAL
2025-04-03 f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
9.9
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 28, 2026 - 18:34 vuln.today
PoC Detected
Sep 17, 2025 - 18:04 vuln.today
Public exploit code
CVE Published
Apr 03, 2025 - 13:15 nvd
CRITICAL 9.9

Description

Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules). The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution. This issue affects pgAdmin 4: before 9.2.

Analysis

pgAdmin 4 contains critical remote code execution vulnerabilities in the Query Tool download and Cloud Deployment endpoints. The query_commited and high_availability parameters are passed directly to Python's eval() function, allowing authenticated users to execute arbitrary Python code on the pgAdmin server.

Technical Context

Two POST endpoints are affected: /sqleditor/query_tool/download (query_commited parameter) and /cloud/deploy (high_availability parameter). Both parameters are passed directly to Python's eval() function without sanitization. An authenticated pgAdmin user can inject arbitrary Python expressions that execute in the server's context with the pgAdmin process privileges.

Affected Products

['pgAdmin 4 (Query Tool and Cloud Deployment modules)']

Remediation

Update pgAdmin 4 to the latest patched version. Restrict pgAdmin access to trusted users and networks. Use strong authentication for all pgAdmin accounts. Run pgAdmin in a container with minimal filesystem and network access. Monitor pgAdmin logs for suspicious query tool download requests.

Priority Score

147
Low Medium High Critical
KEV: 0
EPSS: +77.9
CVSS: +50
POC: +20

Vendor Status

Share

CVE-2025-2945 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy