Impact
The vulnerability occurs when a user with permission to access the File Manager uploads a symbolic link that points outside the intended storage directory. The application checks the absolute path but does not resolve symbolic links, and later the kernel follows the symlink to perform a write. As a result an authenticated user can trick pgAdmin into writing to arbitrary files on the filesystem. This is a CWE‑61 (Path Traversal beyond intended directory) and CWE‑22 (Improper Restriction of Operations within the Bounds of a Multidimensional Array) weakness, and the potential impact includes data tampering, corruption of configuration files, or code execution when the attacker writes executable content.
Affected Systems
pgAdmin 4 by pgadmin.org, any release before 9.15, which is the first version to fix the issue.
Risk and Exploitability
The CVSS score of 7.2 indicates a high severity (high risk). No EPSS score is reported and the vulnerability is not listed in CISA KEV. However, the bug is exploitable by anyone who can authenticate to pgAdmin and has permission to use the File Manager, a common feature in the web interface. The potential for arbitrary file write grants enough control to alter or replace critical configuration files, so the overall risk is significant, though exploitability may depend on the environment and the files reachable by the pgAdmin process.
OpenCVE Enrichment