A extreme distant code execution (RCE) flaw has been uncovered in pgAdmin4, the favored open-source interface for PostgreSQL databases.
Dubbed CVE-2025-12762, the vulnerability impacts variations as much as 9.9 and will permit attackers to run arbitrary instructions on the internet hosting server, doubtlessly compromising complete database infrastructures.
The problem stems from improper dealing with of code injection throughout server-mode restores from PLAIN-format dump information. When pgAdmin processes these information generally used for backing up and migrating PostgreSQL information it fails to sanitize inputs adequately.
An attacker with low privileges, equivalent to an authenticated consumer, might craft a malicious dump file to inject instructions, exploiting the instrument’s execution of system-level operations.
This CWE-94 weak point, rooted in code era from untrusted sources, requires solely community entry and no consumer interplay, making it dangerously simple to use.
The Nationwide Vulnerability Database (NVD) charges the flaw as crucial, with a CVSS v3.1 rating of 9.3 out of 10. Key metrics spotlight its network-based assault vector, low complexity, and adjusted scope, resulting in excessive confidentiality impacts alongside average integrity and availability dangers.
The advisory aligns with a GitHub situation (#9320) reported by the pgAdmin workforce, which traces the foundation trigger to unsafe command building within the restore course of.
pgAdmin builders swiftly addressed the issue in commit 1d39739, launched in model 10.0. Customers working affected setups in server mode, frequent in enterprise environments, face quick threats, particularly if dealing with untrusted dumps from exterior sources.
The flaw underscores broader issues in database instruments, the place restore capabilities usually bypass strict validation.
Organizations ought to prioritize upgrading to pgAdmin 10.0 or later, disable PLAIN-format restores if potential, and audit entry controls. As PostgreSQL powers numerous purposes, this RCE serves as a wake-up name for rigorous enter sanitization in DevOps pipelines.
Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.
