Remote Code Execution Vulnerability in pgAdmin Affecting Versions Up to 9.9
CVE-2025-12762
Key Information:
- Vendor
Pgadmin.org
- Status
- Vendor
- CVE Published:
- 13 November 2025
Badges
What is CVE-2025-12762?
CVE-2025-12762 is a critical vulnerability present in pgAdmin, an open-source management tool for PostgreSQL databases, utilized by organizations for database administration. This vulnerability, specifically a Remote Code Execution (RCE) flaw, is found in versions of pgAdmin up to 9.9. When pgAdmin is operated in server mode and used to restore PLAIN-format dump files, the vulnerability allows attackers to inject and execute arbitrary commands on the server where pgAdmin is hosted. This significantly compromises the integrity and security of the database management system, potentially leading to unauthorized access, data manipulation, and elevated privileges on affected systems.
Potential impact of CVE-2025-12762
-
Unauthorized Remote Access: Attackers can gain control over the server by exploiting this vulnerability, enabling them to execute arbitrary commands. This poses severe security risks, allowing malicious activities, data extraction, or modification of sensitive information.
-
Data Integrity and Confidentiality Breach: The RCE vulnerability can result in attackers altering or deleting critical database records, leading to data corruption and loss of trust in the data's accuracy. This can have dire implications for organizations relying on this data for operational decisions.
-
Threat of Malware Deployment: With the ability to execute arbitrary commands on the server, attackers may deploy malware or ransomware, further jeopardizing the organizationโs IT infrastructure and putting sensitive data at risk of being compromised or held for ransom.
Affected Version(s)
pgAdmin 4 0 <= 9.9
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- ๐
Vulnerability started trending
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
