Impact
pgAdmin 4 in server mode has an authorization flaw that allows an authenticated user to fetch objects belonging to other users by guessing identifiers. The flaw exposes private servers, server groups, background processes, and debugger information, and permits modification of fields that should be owner‑only, leading to credential leakage and arbitrary command execution when the owner runs a shared server. The vulnerability is assigned a CVSS score of 9.4, classifying it as critical.
Affected Systems
The affected product is pgAdmin 4 from pgadmin.org, specifically all releases prior to version 9.15 running in server mode.
Risk and Exploitability
With a CVSS score of 9.4, the risk level is extremely high. The EPSS score is not available, but the flaw requires only an authenticated session to exploit. An attacker who can log in to pgAdmin via server mode can infer object IDs, read or alter sensitive configuration, and trigger shell commands in the owner’s context, potentially compromising the full server environment. The vulnerability is not listed in CISA’s KEV catalog, but its severity and broad reach make it a priority for remediation.
OpenCVE Enrichment