A malicious, but authorised and authenticated user can construct an HTTP request using their existing CSRF token and session cookie to manually upload files to any location that the operating system user account under which pgAdmin is running has permission to write.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-1410 | A malicious, but authorised and authenticated user can construct an HTTP request using their existing CSRF token and session cookie to manually upload files to any location that the operating system user account under which pgAdmin is running has permission to write. |
![]() |
GHSA-cr8c-972v-rmp3 | pgAdmin 4 Path Traversal vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2063759 |
![]() ![]() |
History
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Mon, 17 Mar 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Pgadmin
Pgadmin pgadmin 4 |
|
CPEs | cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:*:*:* | |
Vendors & Products |
Postgresql
Postgresql pgadmin 4 |
Pgadmin
Pgadmin pgadmin 4 |

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-02T23:47:42.970Z
Reserved: 2022-03-14T00:00:00
Link: CVE-2022-0959

No data.

Status : Modified
Published: 2022-03-16T15:15:16.213
Modified: 2025-03-17T16:46:07.940
Link: CVE-2022-0959

No data.

No data.