Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host

Posted on December 15, 2025December 16, 2025 By CWS

A extreme safety vulnerability has been uncovered in pgAdmin 4, the favored open-source PostgreSQL database administration software.

Tracked as CVE-2025-13780, this crucial flaw permits attackers to bypass safety filters and execute arbitrary shell instructions on the host server.

The difficulty stems from the appliance’s plain-text restore characteristic, which did not block harmful instructions hidden in uploaded database recordsdata adequately.

The Failure of the Textual content Filter

In keeping with EndorLabs, the vulnerability exists as a result of pgAdmin 4 relied on a text-based “common expression” (regex) filter to detect and block malicious instructions.

This filter was designed to detect particular patterns utilized by the psql command-line utility to run system instructions.

EndorLabs researchers discovered that the filter was too inflexible. It solely seemed for normal formatting, corresponding to a newline adopted instantly by a command.

FieldDetailsCVE IDCVE-2025-13780Vulnerability TypeRemote Code Execution (RCE)CVSS Base Score9.9Affected ComponentPlain-text Restore FeatureAffected VersionspgAdmin 4 (variations previous to 9.11)Assault VectorUploaded Malicious SQL Dump

Attackers found they might trick this filter by inserting surprising whitespace characters, corresponding to carriage returns or type feeds, between the brand new traces and the instructions.

Whereas the safety filter ignored these “messy” traces, the underlying psql software nonetheless acknowledged and executed them as legitimate directions.

This misconfiguration allowed attackers to execute unauthorized scripts on the server by importing a specifically crafted SQL file.

In response to this EndorLabs discovery, the pgAdmin growth crew launched model 9.11, which essentially modifications how the software program handles safety.

As a substitute of scanning recordsdata for each doable harmful sample, the brand new model makes use of the limit command. This characteristic instructs psql to disable hazardous operations throughout the restore course of.

By implementing safety on the execution stage fairly than the enter stage, the software program is not susceptible to text-hiding methods. EndorLabs strongly recommends that directors improve to model 9.11 instantly.

Counting on older variations leaves programs uncovered to distant code execution( RCE ) assaults that may compromise the whole host surroundings.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Commands, Critical, Execute, Host, PgAdmin, Shell, Vulnerability

Post navigation

Previous Post: FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
Next Post: Apache StreamPark Vulnerability Let Attackers Access Sensitive Data

Related Posts

Chaos Emerges as Faster, Smarter, and More Dangerous Ransomware Cyber Security News
Farmers Insurance Cyber Attack – 1.1 Million Customers Data Exposed in Salesforce Attack Cyber Security News
INE Earns Multiple G2 Winter 2026 Badges Across Global Markets Cyber Security News
Hackers Can Bypass EDR by Downloading Malicious File as In-Memory PE Loader Cyber Security News
Anthropic Unveils “Claude for Healthcare” to Help Users Understand Medical Records Cyber Security News
M-Files Vulnerability Let Attacker Capture Session Tokens of Other Active Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark