Remote Code Execution Vulnerability in pgAdmin 4 by pgAdmin Team
CVE-2025-2945
What is CVE-2025-2945?
CVE-2025-2945 is a remote code execution vulnerability found in pgAdmin 4, a popular open-source administration and management tool for PostgreSQL databases. This product is designed to facilitate database management tasks but is hindered by a flaw that allows attackers to execute arbitrary code remotely. If exploited, this vulnerability could severely compromise the security of an organization’s database environment, leading to unauthorized access, data manipulation, or system control.
Technical Details
The vulnerability is associated with two specific POST endpoints in pgAdmin 4: /sqleditor/query_tool/download
and /cloud/deploy
. The root cause involves the unsafe handling of parameters, specifically query_commited
and high_availability
, which are passed to the Python eval() function without adequate validation. This oversight allows attackers to inject malicious code, resulting in potential remote code execution when these endpoints are called.
This issue affects all versions of pgAdmin 4 prior to version 9.2.
Potential Impact of CVE-2025-2945
-
Unauthorized System Access: Attackers exploiting this vulnerability can gain unauthorized access to critical backend systems, potentially allowing them to manipulate databases or exfiltrate sensitive data.
-
Data Integrity Compromise: With the capability to execute arbitrary code, adversaries could alter or corrupt database entries, leading to significant data integrity issues and operational disruptions.
-
Increased Attack Surface: Successful exploitation could provide attackers with a foothold in the network, enabling further attacks or even the deployment of malware, thereby escalating risks within the organization’s IT infrastructure.
Affected Version(s)
pgAdmin 4 0
References
EPSS Score
34% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved