logo

CVE-2025-2945 pgadmin4

Package

Manager: pip
Name: pgadmin4
Vulnerable Version: >=0 <9.2

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.32536 pctl0.96712

Details

pgAdmin 4 Vulnerable to Remote Code Execution Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules). The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution. This issue affects pgAdmin 4: before 9.2.

Metadata

Created: 2025-04-03T15:31:13Z
Modified: 2025-04-04T14:23:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-g73c-fw68-pwx3/GHSA-g73c-fw68-pwx3.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-g73c-fw68-pwx3
Finding: F422
Auto approve: 1