Description
A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.
Published: 2023-09-22
Score: 6 Medium
EPSS: 27.2% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ghp8-52vx-77j4 pgAdmin failed to properly control the server code
History

Mon, 17 Mar 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Pgadmin pgadmin 4
CPEs cpe:2.3:a:pgadmin:pgadmin:*:*:*:*:*:postgresql:*:* cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*
Vendors & Products Pgadmin pgadmin
Pgadmin pgadmin 4

Subscriptions

Fedoraproject Fedora
Pgadmin Pgadmin 4
cve-icon MITRE

Status: PUBLISHED

Assigner: fedora

Published:

Updated: 2024-08-02T07:44:53.739Z

Reserved: 2023-09-15T16:22:28.547Z

Link: CVE-2023-5002

cve-icon Vulnrichment

Updated: 2024-08-02T07:44:53.739Z

cve-icon NVD

Status : Modified

Published: 2023-09-22T14:15:47.213

Modified: 2025-03-17T16:43:52.873

Link: CVE-2023-5002

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses