Pgadmin 4

8 CVEs product

Monthly

CVE-2026-1707 HIGH PATCH This Week

Command execution in pgAdmin 4 server mode allows authenticated attackers to bypass restore operation restrictions by extracting the restrict key during PLAIN-format dump file operations and injecting malicious payloads to re-enable meta-commands. An attacker with web interface access can race the restore process in real time to achieve reliable code execution on the pgAdmin host. No patch is currently available for this vulnerability.

Authentication Bypass Pgadmin 4 Suse
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2025-12765 HIGH PATCH This Month

pgAdmin <= 9.9 is affected by a vulnerability in the LDAP authentication mechanism allows bypassing TLS certificate verification. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Pgadmin 4 Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-12764 HIGH PATCH This Month

pgAdmin <= 9.9 is affected by an LDAP injection vulnerability in the LDAP authentication flow that allows an attacker to inject special LDAP characters in the username, causing the DC/LDAP server and. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Ldap Code Injection Pgadmin 4 Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-12763 MEDIUM PATCH This Month

pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Command Injection Microsoft Pgadmin 4 Windows Suse
NVD GitHub
CVSS 3.1
6.8
EPSS
0.1%
CVE-2025-12762 CRITICAL PATCH This Week

pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

RCE Code Injection Pgadmin 4 Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.2%
CVE-2025-9636 HIGH PATCH This Month

pgAdmin <= 9.7 is affected by a Cross-Origin Opener Policy (COOP) vulnerability. Rated high severity (CVSS 7.9), this vulnerability is remotely exploitable. No vendor patch available.

Privilege Escalation Pgadmin 4 Suse
NVD GitHub
CVSS 3.1
7.9
EPSS
0.0%
CVE-2025-2946 CRITICAL PATCH Act Now

pgAdmin <= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

XSS Pgadmin 4 Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.1%
CVE-2025-2945 CRITICAL POC PATCH THREAT Emergency

pgAdmin 4 contains critical remote code execution vulnerabilities in the Query Tool download and Cloud Deployment endpoints. The query_commited and high_availability parameters are passed directly to Python's eval() function, allowing authenticated users to execute arbitrary Python code on the pgAdmin server.

RCE Code Injection Python Pgadmin 4 Suse
NVD GitHub
CVSS 3.1
9.9
EPSS
77.9%
CVE-2026-1707
EPSS 0% CVSS 7.4
HIGH PATCH This Week

Command execution in pgAdmin 4 server mode allows authenticated attackers to bypass restore operation restrictions by extracting the restrict key during PLAIN-format dump file operations and injecting malicious payloads to re-enable meta-commands. An attacker with web interface access can race the restore process in real time to achieve reliable code execution on the pgAdmin host. No patch is currently available for this vulnerability.

Authentication Bypass Pgadmin 4 Suse
NVD GitHub
CVE-2025-12765
EPSS 0% CVSS 7.5
HIGH PATCH This Month

pgAdmin <= 9.9 is affected by a vulnerability in the LDAP authentication mechanism allows bypassing TLS certificate verification. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Pgadmin 4 Suse
NVD GitHub
CVE-2025-12764
EPSS 0% CVSS 7.5
HIGH PATCH This Month

pgAdmin <= 9.9 is affected by an LDAP injection vulnerability in the LDAP authentication flow that allows an attacker to inject special LDAP characters in the username, causing the DC/LDAP server and. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Ldap Code Injection Pgadmin 4 +1
NVD GitHub
CVE-2025-12763
EPSS 0% CVSS 6.8
MEDIUM PATCH This Month

pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Command Injection Microsoft Pgadmin 4 +2
NVD GitHub
CVE-2025-12762
EPSS 0% CVSS 9.1
CRITICAL PATCH This Week

pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

RCE Code Injection Pgadmin 4 +1
NVD GitHub
CVE-2025-9636
EPSS 0% CVSS 7.9
HIGH PATCH This Month

pgAdmin <= 9.7 is affected by a Cross-Origin Opener Policy (COOP) vulnerability. Rated high severity (CVSS 7.9), this vulnerability is remotely exploitable. No vendor patch available.

Privilege Escalation Pgadmin 4 Suse
NVD GitHub
CVE-2025-2946
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

pgAdmin <= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

XSS Pgadmin 4 Suse
NVD GitHub
CVE-2025-2945
EPSS 78% CVSS 9.9
CRITICAL POC PATCH THREAT Emergency

pgAdmin 4 contains critical remote code execution vulnerabilities in the Query Tool download and Cloud Deployment endpoints. The query_commited and high_availability parameters are passed directly to Python's eval() function, allowing authenticated users to execute arbitrary Python code on the pgAdmin server.

RCE Code Injection Python +2
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy