GHSA-rm79-x4g6-hvg5

Suggest an improvement
Source
https://github.com/advisories/GHSA-rm79-x4g6-hvg5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-rm79-x4g6-hvg5/GHSA-rm79-x4g6-hvg5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rm79-x4g6-hvg5
Aliases
  • CVE-2025-12763
Published
2025-11-13T15:30:30Z
Modified
2025-11-13T23:27:50.678455Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
pgAdmin 4 has command injection vulnerability on Windows systems
Details

pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providing specially crafted file path input.

Database specific
{
    "severity": "MODERATE",
    "nvd_published_at": "2025-11-13T13:15:44Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-78"
    ],
    "github_reviewed_at": "2025-11-13T23:09:41Z"
}
References

Affected packages

PyPI / pgadmin4

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.10

Affected versions

4.*

4.20
4.22
4.23
4.24
4.25
4.26
4.27
4.28
4.29
4.30

5.*

5.0
5.1
5.2
5.3
5.4
5.5
5.6
5.7

6.*

6.2
6.3
6.4
6.5
6.6
6.7
6.8
6.9
6.10
6.11
6.12
6.13
6.14
6.15
6.16
6.17
6.18
6.19
6.20
6.21

7.*

7.0
7.1
7.2
7.3
7.4
7.5
7.6
7.7
7.8

8.*

8.0
8.1
8.2
8.3
8.4
8.5
8.6
8.7
8.8
8.9
8.10
8.11
8.12
8.13
8.14

9.*

9.0
9.1
9.2
9.3
9.4
9.5
9.6
9.7
9.8
9.9

Database specific

last_known_affected_version_range

"<= 9.9"