Pgadmin

Pgadmin 4

28 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 11.05.2026 16:17:39
  • Zuletzt bearbeitet 13.05.2026 15:34:13

Improper restriction of excessive authentication attempts (CWE-307) in pgAdmin 4. pgAdmin enforces MAX_LOGIN_ATTEMPTS only inside its custom /authenticate/login view. Flask-Security's default /login view, which is registered automatically by securit...

  • EPSS 0.04%
  • Veröffentlicht 11.05.2026 16:17:39
  • Zuletzt bearbeitet 13.05.2026 15:34:13

Symbolic-link path traversal (CWE-61, CWE-22) in pgAdmin 4 File Manager. check_access_permission used os.path.abspath, which resolves '..' but does not resolve symbolic links, while the subsequent kernel write follows symlinks. An authenticated user...

  • EPSS 0.28%
  • Veröffentlicht 11.05.2026 16:17:38
  • Zuletzt bearbeitet 13.05.2026 15:34:13

Deserialization of untrusted data (CWE-502) in pgAdmin 4 FileBackedSessionManager. The session manager performed unsafe deserialization of session-file contents (using Python's standard object-serialization module) before performing any HMAC integri...

  • EPSS 0.03%
  • Veröffentlicht 11.05.2026 16:17:38
  • Zuletzt bearbeitet 13.05.2026 15:34:13

Local file inclusion (LFI) and server-side request forgery (SSRF) vulnerabilities in pgAdmin 4 LLM API configuration endpoints. User-supplied api_key_file and api_url preferences were passed to the LLM provider clients without validation. An authent...

  • EPSS 0.19%
  • Veröffentlicht 11.05.2026 16:17:38
  • Zuletzt bearbeitet 13.05.2026 15:34:13

OS command injection (CWE-78) vulnerability in pgAdmin 4 Import/Export query export. User-supplied input was interpolated directly into a psql \copy metacommand template without sanitization. An authenticated user could inject ") TO PROGRAM 'cmd'" t...

  • EPSS 0.05%
  • Veröffentlicht 11.05.2026 16:17:37
  • Zuletzt bearbeitet 13.05.2026 15:34:13

SQL injection vulnerability in pgAdmin 4 Maintenance Tool. Four user-supplied JSON fields (buffer_usage_limit, vacuum_parallel, vacuum_index_cleanup, reindex_tablespace) were concatenated directly into the rendered VACUUM/ANALYZE/REINDEX command and...

  • EPSS 0.03%
  • Veröffentlicht 11.05.2026 16:17:37
  • Zuletzt bearbeitet 13.05.2026 15:34:13

Stored cross-site scripting (XSS) vulnerability in pgAdmin 4 Browser Tree and Explain Visualizer modules. User-controlled PostgreSQL object names (database, schema, table, column, etc.) were assigned to DOM elements via innerHTML, allowing crafted o...

  • EPSS 0.06%
  • Veröffentlicht 11.05.2026 16:17:37
  • Zuletzt bearbeitet 13.05.2026 15:34:13

Authorization vulnerability in pgAdmin 4 server mode affecting Server Groups, Servers, Shared Servers, Background Processes, and Debugger modules. Multiple endpoints fetched user-owned objects without filtering by the requesting user's identity. An ...

  • EPSS 0.02%
  • Veröffentlicht 05.02.2026 17:30:05
  • Zuletzt bearbeitet 26.02.2026 22:20:45

pgAdmin versions 9.11 are affected by a Restore restriction bypass via key disclosure vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. An attacker with access to the pgAdmin web interface can...

  • EPSS 0.1%
  • Veröffentlicht 11.12.2025 18:30:47
  • Zuletzt bearbeitet 19.12.2025 19:51:13

pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands...