A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
GHSA-ghp8-52vx-77j4 | pgAdmin failed to properly control the server code |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 17 Mar 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Pgadmin pgadmin 4
|
|
CPEs | cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:* | |
Vendors & Products |
Pgadmin pgadmin
|
Pgadmin pgadmin 4
|

Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2024-08-02T07:44:53.739Z
Reserved: 2023-09-15T16:22:28.547Z
Link: CVE-2023-5002

Updated: 2024-08-02T07:44:53.739Z

Status : Modified
Published: 2023-09-22T14:15:47.213
Modified: 2025-03-17T16:43:52.873
Link: CVE-2023-5002

No data.

No data.