Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers

Posted on November 15, 2025November 15, 2025 By CWS

A extreme distant code execution (RCE) flaw has been uncovered in pgAdmin4, the favored open-source interface for PostgreSQL databases.

Dubbed CVE-2025-12762, the vulnerability impacts variations as much as 9.9 and will permit attackers to run arbitrary instructions on the internet hosting server, doubtlessly compromising complete database infrastructures.

The problem stems from improper dealing with of code injection throughout server-mode restores from PLAIN-format dump information. When pgAdmin processes these information generally used for backing up and migrating PostgreSQL information it fails to sanitize inputs adequately.

An attacker with low privileges, equivalent to an authenticated consumer, might craft a malicious dump file to inject instructions, exploiting the instrument’s execution of system-level operations.

This CWE-94 weak point, rooted in code era from untrusted sources, requires solely community entry and no consumer interplay, making it dangerously simple to use.

The Nationwide Vulnerability Database (NVD) charges the flaw as crucial, with a CVSS v3.1 rating of 9.3 out of 10. Key metrics spotlight its network-based assault vector, low complexity, and adjusted scope, resulting in excessive confidentiality impacts alongside average integrity and availability dangers.

The advisory aligns with a GitHub situation (#9320) reported by the pgAdmin workforce, which traces the foundation trigger to unsafe command building within the restore course of.

pgAdmin builders swiftly addressed the issue in commit 1d39739, launched in model 10.0. Customers working affected setups in server mode, frequent in enterprise environments, face quick threats, particularly if dealing with untrusted dumps from exterior sources.

The flaw underscores broader issues in database instruments, the place restore capabilities usually bypass strict validation.

Organizations ought to prioritize upgrading to pgAdmin 10.0 or later, disable PLAIN-format restores if potential, and audit entry controls. As PostgreSQL powers numerous purposes, this RCE serves as a wake-up name for rigorous enter sanitization in DevOps pipelines.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Code, Critical, Execute, Lets, pgAdmin4, Remote, Servers, Vulnerability

Post navigation

Previous Post: RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools
Next Post: PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild

Related Posts

Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User Cyber Security News
Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms Cyber Security News
macOS Gatekeeper Explained: Strengthening System Defenses Cyber Security News
CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks Cyber Security News
Google’s AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation Cyber Security News
New BRAODO Stealer Campaign Abuses GitHub To Host Payloads And Evade Detection  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
  • Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges
  • PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild
  • Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers
  • RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
  • Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges
  • PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild
  • Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers
  • RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News