Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host

Posted on December 15, 2025December 16, 2025 By CWS

A extreme safety vulnerability has been uncovered in pgAdmin 4, the favored open-source PostgreSQL database administration software.

Tracked as CVE-2025-13780, this crucial flaw permits attackers to bypass safety filters and execute arbitrary shell instructions on the host server.

The difficulty stems from the appliance’s plain-text restore characteristic, which did not block harmful instructions hidden in uploaded database recordsdata adequately.

The Failure of the Textual content Filter

In keeping with EndorLabs, the vulnerability exists as a result of pgAdmin 4 relied on a text-based “common expression” (regex) filter to detect and block malicious instructions.

This filter was designed to detect particular patterns utilized by the psql command-line utility to run system instructions.

EndorLabs researchers discovered that the filter was too inflexible. It solely seemed for normal formatting, corresponding to a newline adopted instantly by a command.

FieldDetailsCVE IDCVE-2025-13780Vulnerability TypeRemote Code Execution (RCE)CVSS Base Score9.9Affected ComponentPlain-text Restore FeatureAffected VersionspgAdmin 4 (variations previous to 9.11)Assault VectorUploaded Malicious SQL Dump

Attackers found they might trick this filter by inserting surprising whitespace characters, corresponding to carriage returns or type feeds, between the brand new traces and the instructions.

Whereas the safety filter ignored these “messy” traces, the underlying psql software nonetheless acknowledged and executed them as legitimate directions.

This misconfiguration allowed attackers to execute unauthorized scripts on the server by importing a specifically crafted SQL file.

In response to this EndorLabs discovery, the pgAdmin growth crew launched model 9.11, which essentially modifications how the software program handles safety.

As a substitute of scanning recordsdata for each doable harmful sample, the brand new model makes use of the limit command. This characteristic instructs psql to disable hazardous operations throughout the restore course of.

By implementing safety on the execution stage fairly than the enter stage, the software program is not susceptible to text-hiding methods. EndorLabs strongly recommends that directors improve to model 9.11 instantly.

Counting on older variations leaves programs uncovered to distant code execution( RCE ) assaults that may compromise the whole host surroundings.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Commands, Critical, Execute, Host, PgAdmin, Shell, Vulnerability

Post navigation

Previous Post: FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
Next Post: Apache StreamPark Vulnerability Let Attackers Access Sensitive Data

Related Posts

Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations Cyber Security News
Realtek Vulnerability Let Attackers Trigger DoS Attack via Bluetooth Secure Connections Pairing Process Cyber Security News
Emerging Cyber Threats Featuring QR Codes ClickFix and LOLBins Challenging SOC Defenses Cyber Security News
New Malware Via WhatsApp Exfiltrate Contacts to Attack Server and Deploys Malware Cyber Security News
Pig-Butchering Scams Operators Scaled Their Operations with The Support of AI-Assistants Cyber Security News
New MobileGestalt Exploit for iOS 26.0.1 Enables Unauthorized Writes to Protected Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators
  • Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
  • LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
  • From Open Source to OpenAI: The Evolution of Third-Party Risk
  • Link11 Identifies Five Cybersecurity Trends Shaping European Defense Strategies in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators
  • Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
  • LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
  • From Open Source to OpenAI: The Evolution of Third-Party Risk
  • Link11 Identifies Five Cybersecurity Trends Shaping European Defense Strategies in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark