pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providing specially crafted file path input.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rm79-x4g6-hvg5 | pgAdmin 4 has command injection vulnerability on Windows systems |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/pgadmin-org/pgadmin4/issues/9323 |
|
History
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Pgadmin Pgadmin pgadmin 4 |
|
| Vendors & Products |
Microsoft
Microsoft windows Pgadmin Pgadmin pgadmin 4 |
Thu, 13 Nov 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providing specially crafted file path input. | |
| Title | Command injection vulnerability allowing arbitrary command execution on Windows | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: PostgreSQL
Published:
Updated: 2025-11-14T04:55:28.677Z
Reserved: 2025-11-05T17:30:06.043Z
Link: CVE-2025-12763
No data.
Status : Received
Published: 2025-11-13T13:15:44.777
Modified: 2025-11-13T13:15:44.777
Link: CVE-2025-12763
No data.
OpenCVE Enrichment
Updated: 2025-11-14T09:27:54Z
Github GHSA