Remote Code Execution Vulnerability in pgAdmin 4 by pgAdmin Team
CVE-2025-2945

9.9CRITICAL

Key Information:

Status
Vendor
CVE Published:
3 April 2025

What is CVE-2025-2945?

CVE-2025-2945 is a remote code execution vulnerability found in pgAdmin 4, a popular open-source administration and management tool for PostgreSQL databases. This product is designed to facilitate database management tasks but is hindered by a flaw that allows attackers to execute arbitrary code remotely. If exploited, this vulnerability could severely compromise the security of an organization’s database environment, leading to unauthorized access, data manipulation, or system control.

Technical Details

The vulnerability is associated with two specific POST endpoints in pgAdmin 4: /sqleditor/query_tool/download and /cloud/deploy. The root cause involves the unsafe handling of parameters, specifically query_commited and high_availability, which are passed to the Python eval() function without adequate validation. This oversight allows attackers to inject malicious code, resulting in potential remote code execution when these endpoints are called.

This issue affects all versions of pgAdmin 4 prior to version 9.2.

Potential Impact of CVE-2025-2945

  1. Unauthorized System Access: Attackers exploiting this vulnerability can gain unauthorized access to critical backend systems, potentially allowing them to manipulate databases or exfiltrate sensitive data.

  2. Data Integrity Compromise: With the capability to execute arbitrary code, adversaries could alter or corrupt database entries, leading to significant data integrity issues and operational disruptions.

  3. Increased Attack Surface: Successful exploitation could provide attackers with a foothold in the network, enabling further attacks or even the deployment of malware, thereby escalating risks within the organization’s IT infrastructure.

Affected Version(s)

pgAdmin 4 0

References

EPSS Score

34% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.