Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host

Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host

Posted on December 15, 2025December 16, 2025 By CWS

A extreme safety vulnerability has been uncovered in pgAdmin 4, the favored open-source PostgreSQL database administration software.

Tracked as CVE-2025-13780, this crucial flaw permits attackers to bypass safety filters and execute arbitrary shell instructions on the host server.

The difficulty stems from the appliance’s plain-text restore characteristic, which did not block harmful instructions hidden in uploaded database recordsdata adequately.

The Failure of the Textual content Filter

In keeping with EndorLabs, the vulnerability exists as a result of pgAdmin 4 relied on a text-based “common expression” (regex) filter to detect and block malicious instructions.

This filter was designed to detect particular patterns utilized by the psql command-line utility to run system instructions.

EndorLabs researchers discovered that the filter was too inflexible. It solely seemed for normal formatting, corresponding to a newline adopted instantly by a command.

FieldDetailsCVE IDCVE-2025-13780Vulnerability TypeRemote Code Execution (RCE)CVSS Base Score9.9Affected ComponentPlain-text Restore FeatureAffected VersionspgAdmin 4 (variations previous to 9.11)Assault VectorUploaded Malicious SQL Dump

Attackers found they might trick this filter by inserting surprising whitespace characters, corresponding to carriage returns or type feeds, between the brand new traces and the instructions.

Whereas the safety filter ignored these “messy” traces, the underlying psql software nonetheless acknowledged and executed them as legitimate directions.

This misconfiguration allowed attackers to execute unauthorized scripts on the server by importing a specifically crafted SQL file.

In response to this EndorLabs discovery, the pgAdmin growth crew launched model 9.11, which essentially modifications how the software program handles safety.

As a substitute of scanning recordsdata for each doable harmful sample, the brand new model makes use of the limit command. This characteristic instructs psql to disable hazardous operations throughout the restore course of.

By implementing safety on the execution stage fairly than the enter stage, the software program is not susceptible to text-hiding methods. EndorLabs strongly recommends that directors improve to model 9.11 instantly.

Counting on older variations leaves programs uncovered to distant code execution( RCE ) assaults that may compromise the whole host surroundings.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Commands, Critical, Execute, Host, PgAdmin, Shell, Vulnerability

Post navigation

Previous Post: FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
Next Post: Apache StreamPark Vulnerability Let Attackers Access Sensitive Data

Related Posts

VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code Cyber Security News
Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts Cyber Security News
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Cyber Security News
APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins Cyber Security News
Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware Cyber Security News
Chinese Hackers Actively Attacking Taiwan Critical Infrastructure Chinese Hackers Actively Attacking Taiwan Critical Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News