pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providing specially crafted file path input.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rm79-x4g6-hvg5 pgAdmin 4 has command injection vulnerability on Windows systems
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 14 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Pgadmin
Pgadmin pgadmin 4
Vendors & Products Microsoft
Microsoft windows
Pgadmin
Pgadmin pgadmin 4

Thu, 13 Nov 2025 13:15:00 +0000

Type Values Removed Values Added
Description pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providing specially crafted file path input.
Title Command injection vulnerability allowing arbitrary command execution on Windows
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PostgreSQL

Published:

Updated: 2025-11-14T04:55:28.677Z

Reserved: 2025-11-05T17:30:06.043Z

Link: CVE-2025-12763

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-13T13:15:44.777

Modified: 2025-11-13T13:15:44.777

Link: CVE-2025-12763

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-14T09:27:54Z