Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fxmw-jcgr-w44v

Опубликовано: 11 дек. 2025
Источник: github
Github: Прошло ревью
CVSS3: 9.1

Описание

pgadmin4 has a Meta-Command Filter Command Execution

The PLAIN restore meta-command filter introduced in pgAdmin as part of the fix for CVE-2025-12762 does not detect meta-commands when a SQL file begins with a UTF-8 Byte Order Mark (EF BB BF) or other special byte sequences. The implemented filter uses the function has_meta_commands(), which scans raw bytes using a regular expression. The regex does not treat the bytes as ignorable, so meta-commands such as \\! remain undetected. When pgAdmin invokes psql with --file, psql strips the bytes and executes the command. This can result in remote command execution during a restore operation.

Пакеты

Наименование

pgadmin4

pip
Затронутые версииВерсия исправления

< 9.11

9.11

EPSS

Процентиль: 35%
0.00144
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-77
CWE-94

Связанные уязвимости

CVSS3: 9.1
nvd
около 2 месяцев назад

pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.

CVSS3: 9.1
debian
около 2 месяцев назад

pgAdmin versions up to 9.10 are affected by a Remote Code Execution (R ...

CVSS3: 9.1
fstec
около 2 месяцев назад

Уязвимость функции has_meta_commands() инструмента управления базами данных pgAdmin 4, позволяющая нарушителю обойти существующие механизмы безопасности

EPSS

Процентиль: 35%
0.00144
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-77
CWE-94