Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host

Posted on December 15, 2025December 16, 2025 By CWS

A extreme safety vulnerability has been uncovered in pgAdmin 4, the favored open-source PostgreSQL database administration software.

Tracked as CVE-2025-13780, this crucial flaw permits attackers to bypass safety filters and execute arbitrary shell instructions on the host server.

The difficulty stems from the appliance’s plain-text restore characteristic, which did not block harmful instructions hidden in uploaded database recordsdata adequately.

The Failure of the Textual content Filter

In keeping with EndorLabs, the vulnerability exists as a result of pgAdmin 4 relied on a text-based “common expression” (regex) filter to detect and block malicious instructions.

This filter was designed to detect particular patterns utilized by the psql command-line utility to run system instructions.

EndorLabs researchers discovered that the filter was too inflexible. It solely seemed for normal formatting, corresponding to a newline adopted instantly by a command.

FieldDetailsCVE IDCVE-2025-13780Vulnerability TypeRemote Code Execution (RCE)CVSS Base Score9.9Affected ComponentPlain-text Restore FeatureAffected VersionspgAdmin 4 (variations previous to 9.11)Assault VectorUploaded Malicious SQL Dump

Attackers found they might trick this filter by inserting surprising whitespace characters, corresponding to carriage returns or type feeds, between the brand new traces and the instructions.

Whereas the safety filter ignored these “messy” traces, the underlying psql software nonetheless acknowledged and executed them as legitimate directions.

This misconfiguration allowed attackers to execute unauthorized scripts on the server by importing a specifically crafted SQL file.

In response to this EndorLabs discovery, the pgAdmin growth crew launched model 9.11, which essentially modifications how the software program handles safety.

As a substitute of scanning recordsdata for each doable harmful sample, the brand new model makes use of the limit command. This characteristic instructs psql to disable hazardous operations throughout the restore course of.

By implementing safety on the execution stage fairly than the enter stage, the software program is not susceptible to text-hiding methods. EndorLabs strongly recommends that directors improve to model 9.11 instantly.

Counting on older variations leaves programs uncovered to distant code execution( RCE ) assaults that may compromise the whole host surroundings.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Commands, Critical, Execute, Host, PgAdmin, Shell, Vulnerability

Post navigation

Previous Post: FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
Next Post: Apache StreamPark Vulnerability Let Attackers Access Sensitive Data

Related Posts

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique Cyber Security News
Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure Cyber Security News
PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild Cyber Security News
5 Email Attacks SOCs Cannot Detect Without A Sandbox  Cyber Security News
New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins Cyber Security News
Top 10 Best Supply Chain Risk Management Solutions in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 700,000 Records Compromised in Askul Ransomware Attack
  • Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks
  • Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs
  • Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure
  • Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 700,000 Records Compromised in Askul Ransomware Attack
  • Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks
  • Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs
  • Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure
  • Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark