Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rm79-x4g6-hvg5 | pgAdmin 4 has command injection vulnerability on Windows systems |
| Link | Providers |
|---|---|
| https://github.com/pgadmin-org/pgadmin4/issues/9323 |
|
Mon, 01 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Pgadmin Pgadmin pgadmin 4 |
|
| Vendors & Products |
Microsoft
Microsoft windows Pgadmin Pgadmin pgadmin 4 |
Thu, 13 Nov 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providing specially crafted file path input. | |
| Title | Command injection vulnerability allowing arbitrary command execution on Windows | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: PostgreSQL
Published:
Updated: 2026-02-26T16:57:06.806Z
Reserved: 2025-11-05T17:30:06.043Z
Link: CVE-2025-12763
Updated: 2025-12-01T19:14:54.367Z
Status : Modified
Published: 2025-11-13T13:15:44.777
Modified: 2025-12-01T20:15:49.517
Link: CVE-2025-12763
No data.
OpenCVE Enrichment
Updated: 2025-11-14T09:27:54Z
Github GHSA