Skip to content

Commit 33b26d9

Browse files
committed
1 parent de0920f commit 33b26d9

File tree

1 file changed

+26
-4
lines changed

1 file changed

+26
-4
lines changed

advisories/unreviewed/2025/12/GHSA-fxmw-jcgr-w44v/GHSA-fxmw-jcgr-w44v.json

Lines changed: 26 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,37 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fxmw-jcgr-w44v",
4-
"modified": "2025-12-11T21:31:28Z",
4+
"modified": "2025-12-11T21:31:29Z",
55
"published": "2025-12-11T21:31:28Z",
66
"aliases": [
77
"CVE-2025-13780"
88
],
9-
"details": "pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.",
9+
"summary": "pgadmin4 < 9.11 Meta-Command Filter Command Execution",
10+
"details": "The PLAIN restore meta-command filter introduced in pgAdmin as part of the fix for Issue 9320 does not detect meta-commands when a SQL file begins with a UTF-8 Byte Order Mark (EF BB BF) or other special byte sequences. The implemented filter uses the function `has_meta_commands()`, which scans raw bytes using a regular expression. The regex does not treat the bytes as ignorable, so meta-commands such as \\! remain undetected. When pgAdmin invokes psql with --file, psql strips the bytes and executes the command. This can result in remote command execution during a restore operation.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": ""
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
}
30+
]
31+
}
32+
]
33+
}
34+
],
1735
"references": [
1836
{
1937
"type": "ADVISORY",
@@ -22,11 +40,15 @@
2240
{
2341
"type": "WEB",
2442
"url": "https://github.com/pgadmin-org/pgadmin4/issues/9368"
43+
},
44+
{
45+
"type": "WEB",
46+
"url": "https://github.com/zeropwn/pgadmin4-9.10-CVE-2025-13780"
2547
}
2648
],
2749
"database_specific": {
2850
"cwe_ids": [
29-
"CWE-94"
51+
"CWE-77"
3052
],
3153
"severity": "CRITICAL",
3254
"github_reviewed": false,

0 commit comments

Comments
 (0)