Description
A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.
Published: 2023-09-22
Score: 6 Medium
EPSS: 23.8% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ghp8-52vx-77j4 pgAdmin failed to properly control the server code
History

Mon, 17 Mar 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Pgadmin pgadmin 4
CPEs cpe:2.3:a:pgadmin:pgadmin:*:*:*:*:*:postgresql:*:* cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*
Vendors & Products Pgadmin pgadmin
Pgadmin pgadmin 4

Subscriptions

Fedoraproject Fedora
Pgadmin Pgadmin 4
cve-icon MITRE

Status: PUBLISHED

Assigner: fedora

Published:

Updated: 2024-08-02T07:44:53.739Z

Reserved: 2023-09-15T16:22:28.547Z

Link: CVE-2023-5002

cve-icon Vulnrichment

Updated: 2024-08-02T07:44:53.739Z

cve-icon NVD

Status : Modified

Published: 2023-09-22T14:15:47.213

Modified: 2025-03-17T16:43:52.873

Link: CVE-2023-5002

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses