Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-w2p4-p4rh-qcm3: pgAdmin4 vulnerable to Remote Code Execution (RCE) when running in server mode

pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.

ghsa
#vulnerability#web#git#intel#rce

Skip to content

Navigation Menu

    • GitHub Copilot

      Write better code with AI

    • GitHub Spark New

      Build and deploy intelligent apps

    • GitHub Models New

      Manage and compare prompts

    • GitHub Advanced Security

      Find and fix vulnerabilities

    • Actions

      Automate any workflow

*   Codespaces
    
    Instant dev environments
    
*   Issues
    
    Plan and track work
    
*   Code Review
    
    Manage code changes
    
*   Discussions
    
    Collaborate outside of code
    
*   Code Search
    
    Find more, search less
    

View all features
  • Explore

    • Learning Pathways
    • Events & Webinars
    • Ebooks & Whitepapers
    • Customer Stories
    • Partners
    • Executive Insights
    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    • Enterprise platform

      AI-powered developer platform

  • Pricing

Provide feedback

Saved searches****Use saved searches to filter your results more quickly

Sign up

Appearance settings

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-12762

pgAdmin4 vulnerable to Remote Code Execution (RCE) when running in server mode

Critical severity GitHub Reviewed Published Nov 13, 2025 to the GitHub Advisory Database • Updated Nov 13, 2025

Package

pip pgadmin4 (pip)

Description

pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.

References

  • https://nvd.nist.gov/vuln/detail/CVE-2025-12762
  • pgadmin-org/pgadmin4#9320
  • pgadmin-org/pgadmin4@1d39739

Published to the GitHub Advisory Database

Nov 13, 2025

Last updated

Nov 13, 2025

EPSS score

ghsa: Latest News

GHSA-56mx-8g9f-5crf: Incus vulnerable to local privilege escalation through custom storage volumes