Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fxmw-jcgr-w44v | pgadmin4 has a Meta-Command Filter Command Execution |
| Link | Providers |
|---|---|
| https://github.com/pgadmin-org/pgadmin4/issues/9368 |
|
Fri, 19 Dec 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:* |
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pgadmin
Pgadmin pgadmin 4 |
|
| Vendors & Products |
Pgadmin
Pgadmin pgadmin 4 |
Thu, 11 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
ssvc
|
Thu, 11 Dec 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data. | |
| Title | Remote Code Execution vulnerability when restoring PLAIN-format SQL dumps in server mode (pgAdmin 4) | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: PostgreSQL
Published:
Updated: 2026-02-26T16:07:46.344Z
Reserved: 2025-11-28T17:30:53.262Z
Link: CVE-2025-13780
Updated: 2025-12-11T19:27:12.629Z
Status : Analyzed
Published: 2025-12-11T19:15:52.857
Modified: 2025-12-19T19:51:13.657
Link: CVE-2025-13780
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:49:10Z
Github GHSA