Pgadmin

Pgadmin 4

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 13.11.2025 13:15:45
  • Zuletzt bearbeitet 19.11.2025 21:18:09

pgAdmin <= 9.9  is affected by a vulnerability in the LDAP authentication mechanism allows bypassing TLS certificate verification.

  • EPSS 0.07%
  • Veröffentlicht 13.11.2025 13:15:44
  • Zuletzt bearbeitet 19.11.2025 21:19:33

pgAdmin <= 9.9  is affected by an LDAP injection vulnerability in the LDAP authentication flow that allows an attacker to inject special LDAP characters in the username, causing the DC/LDAP server and the client to process an unusual amount of data D...

  • EPSS 0.06%
  • Veröffentlicht 13.11.2025 13:15:44
  • Zuletzt bearbeitet 01.12.2025 20:15:49

pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providin...

  • EPSS 0.14%
  • Veröffentlicht 13.11.2025 13:15:44
  • Zuletzt bearbeitet 01.12.2025 20:15:49

pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands ...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2025 16:43:27
  • Zuletzt bearbeitet 11.09.2025 21:26:47

pgAdmin <= 9.7 is affected by a Cross-Origin Opener Policy (COOP) vulnerability. This vulnerability allows an attacker to manipulate the OAuth flow, potentially leading to unauthorised account access, account takeover, data breaches, and privilege e...

  • EPSS 0.03%
  • Veröffentlicht 03.04.2025 13:15:43
  • Zuletzt bearbeitet 23.04.2025 22:24:39

pgAdmin <= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers execute any arbitrary HTML/JavaScript in a user's browser through query result rendering, then HTML/JavaScript runs on the browser.

Exploit
  • EPSS 59.69%
  • Veröffentlicht 03.04.2025 13:15:43
  • Zuletzt bearbeitet 17.09.2025 18:04:10

Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules). The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy end...

  • EPSS 92.69%
  • Veröffentlicht 23.09.2024 17:15:14
  • Zuletzt bearbeitet 22.09.2025 18:37:17

pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.

  • EPSS 0.07%
  • Veröffentlicht 25.06.2024 16:15:25
  • Zuletzt bearbeitet 23.09.2025 01:47:35

pgAdmin <= 8.8 has an installation Directory permission issue. Because of this issue, attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 02.05.2024 18:15:07
  • Zuletzt bearbeitet 19.09.2025 13:27:28

pgAdmin <= 8.5 is affected by XSS vulnerability in /settings/store API response json payload. This vulnerability allows attackers to execute malicious script at the client end.