Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-13780 (GCVE-0-2025-13780)
Vulnerability from cvelistv5 – Published: 2025-12-11 18:30 – Updated: 2026-02-26 16:07
VLAI?
EPSS
Title
Remote Code Execution vulnerability when restoring PLAIN-format SQL dumps in server mode (pgAdmin 4)
Summary
pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.
Severity ?
9.1 (Critical)
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://github.com/pgadmin-org/pgadmin4/issues/9368 | issue-tracking |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| pgadmin.org | pgAdmin 4 |
Affected:
0 , ≤ 9.10
(custom)
|
Date Public ?
2025-11-05 10:54
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-13780",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-12T04:55:53.536076Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T16:07:46.344Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"Restore"
],
"product": "pgAdmin 4",
"programFiles": [
"https://github.com/pgadmin-org/pgadmin4/blob/master/web/pgadmin/tools/restore/__init__.py"
],
"repo": "https://github.com/pgadmin-org/pgadmin4",
"vendor": "pgadmin.org",
"versions": [
{
"lessThanOrEqual": "9.10",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-11-05T10:54:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.\u003cbr\u003e"
}
],
"value": "pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-11T18:30:47.812Z",
"orgId": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"shortName": "PostgreSQL"
},
"references": [
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/pgadmin-org/pgadmin4/issues/9368"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Remote Code Execution vulnerability when restoring PLAIN-format SQL dumps in server mode (pgAdmin 4)",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"assignerShortName": "PostgreSQL",
"cveId": "CVE-2025-13780",
"datePublished": "2025-12-11T18:30:47.812Z",
"dateReserved": "2025-11-28T17:30:53.262Z",
"dateUpdated": "2026-02-26T16:07:46.344Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-13780",
"date": "2026-05-20",
"epss": "0.00102",
"percentile": "0.27497"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-13780\",\"sourceIdentifier\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"published\":\"2025-12-11T19:15:52.857\",\"lastModified\":\"2025-12-19T19:51:13.657\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.1,\"impactScore\":5.3},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*\",\"versionEndIncluding\":\"9.10\",\"matchCriteriaId\":\"31BFDAD3-B87D-46DD-9984-3000087309DD\"}]}]}],\"references\":[{\"url\":\"https://github.com/pgadmin-org/pgadmin4/issues/9368\",\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"tags\":[\"Issue Tracking\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-13780\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-11T19:18:41.930091Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-94\", \"description\": \"CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-11T19:27:12.629Z\"}}], \"cna\": {\"title\": \"Remote Code Execution vulnerability when restoring PLAIN-format SQL dumps in server mode (pgAdmin 4)\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/pgadmin-org/pgadmin4\", \"vendor\": \"pgadmin.org\", \"modules\": [\"Restore\"], \"product\": \"pgAdmin 4\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.10\"}], \"programFiles\": [\"https://github.com/pgadmin-org/pgadmin4/blob/master/web/pgadmin/tools/restore/__init__.py\"], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2025-11-05T10:54:00.000Z\", \"references\": [{\"url\": \"https://github.com/pgadmin-org/pgadmin4/issues/9368\", \"tags\": [\"issue-tracking\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"shortName\": \"PostgreSQL\", \"dateUpdated\": \"2025-12-11T18:30:47.812Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-13780\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-12T04:55:52.792Z\", \"dateReserved\": \"2025-11-28T17:30:53.262Z\", \"assignerOrgId\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"datePublished\": \"2025-12-11T18:30:47.812Z\", \"assignerShortName\": \"PostgreSQL\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
BDU:2025-15881
Vulnerability from fstec - Published: 11.12.2025
VLAI Severity ?
Title
Уязвимость функции has_meta_commands() инструмента управления базами данных pgAdmin 4, позволяющая нарушителю обойти существующие механизмы безопасности
Description
Уязвимость функции has_meta_commands() инструмента управления базами данных pgAdmin 4 связана с неверным управлением генерацией кода. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, обойти существующие механизмы безопасности путем внедрения специально сформированного SQL-файла
Severity ?
Vendor
Fedora Project, PostgreSQL Community Association of Canada, ООО «Ред Софт»
Software Name
Fedora, pgAdmin 4, РЕД ОС (запись в едином реестре российских программ №3751)
Software Version
42 (Fedora), 43 (Fedora), до 9.11 (pgAdmin 4), 8.0 (РЕД ОС)
Possible Mitigations
Установка обновлений из доверенных источников. В связи со сложившейся обстановкой и введенными санкциями против Российской Федерации рекомендуется устанавливать обновления программного обеспечения только после оценки всех сопутствующих рисков.
Компенсирующие меры:
- ограничение возможности импорта в систему управления баз данных файлов, полученных из недоверенных источников;
- использование антивирусного программного обеспечения для проверки файлов, полученных из недоверенных источников;
- использование замкнутой программной среды для работы с файлами, полученными из недоверенных источников;
- использование средств межсетевого экранирования для ограничения доступа к уязвимому программному обеспечению;
- ограничение доступа к уязвимому программному обеспечению, используя схему доступа по «белым спискам»;
- использование систем обнаружения и предотвращения вторжений для обнаружения (выявления, регистрации) и реагирования на попытки эксплуатации уязвимостей;
- ограничение доступа из внешних сетей (Интернет).
В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций производителя:
Для pgAdmin4:
https://www.postgresql.org/about/news/pgadmin-4-v911-released-3192/
Для Fedora:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2025-13780
Для Ред ОС:
http://repo.red-soft.ru/redos/8.0/x86_64/updates/
Reference
https://www.postgresql.org/about/news/pgadmin-4-v911-released-3192/
https://www.endorlabs.com/learn/when-regex-isnt-enough-how-we-discovered-cve-2025-13780-in-pgadmin
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2025-13780
http://repo.red-soft.ru/redos/8.0/x86_64/updates/
CWE
CWE-94
{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:C/I:P/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Fedora Project, PostgreSQL Community Association of Canada, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "42 (Fedora), 43 (Fedora), \u0434\u043e 9.11 (pgAdmin 4), 8.0 (\u0420\u0415\u0414 \u041e\u0421)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432. \u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0438\u043c\u043f\u043e\u0440\u0442\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437 \u0434\u0430\u043d\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432, \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u0445 \u0438\u0437 \u043d\u0435\u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0444\u0430\u0439\u043b\u043e\u0432, \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u0445 \u0438\u0437 \u043d\u0435\u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0437\u0430\u043c\u043a\u043d\u0443\u0442\u043e\u0439 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u044b \u0434\u043b\u044f \u0440\u0430\u0431\u043e\u0442\u044b \u0441 \u0444\u0430\u0439\u043b\u0430\u043c\u0438, \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u043c\u0438 \u0438\u0437 \u043d\u0435\u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e;\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0441\u0445\u0435\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043f\u043e \u00ab\u0431\u0435\u043b\u044b\u043c \u0441\u043f\u0438\u0441\u043a\u0430\u043c\u00bb;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f (\u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f, \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438) \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439;\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438\u0437 \u0432\u043d\u0435\u0448\u043d\u0438\u0445 \u0441\u0435\u0442\u0435\u0439 (\u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442).\n\n\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\n\u0414\u043b\u044f pgAdmin4:\nhttps://www.postgresql.org/about/news/pgadmin-4-v911-released-3192/\n\n\u0414\u043b\u044f Fedora:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2025-13780\n\n\u0414\u043b\u044f \u0420\u0435\u0434 \u041e\u0421: \nhttp://repo.red-soft.ru/redos/8.0/x86_64/updates/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "11.12.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "29.01.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "15.12.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-15881",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-13780",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Fedora, pgAdmin 4, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Fedora Project Fedora 42 , Fedora Project Fedora 43 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 8.0 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 has_meta_commands() \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 pgAdmin 4, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u0431\u043e\u0439\u0442\u0438 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0432\u0435\u0440\u043d\u043e\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0435\u0439 \u043a\u043e\u0434\u0430 (\u0412\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430) (CWE-94)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 has_meta_commands() \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 pgAdmin 4 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0435\u0439 \u043a\u043e\u0434\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043e\u0431\u043e\u0439\u0442\u0438 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u0443\u0442\u0435\u043c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e SQL-\u0444\u0430\u0439\u043b\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u0431\u0445\u043e\u0434 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438",
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.postgresql.org/about/news/pgadmin-4-v911-released-3192/\nhttps://www.endorlabs.com/learn/when-regex-isnt-enough-how-we-discovered-cve-2025-13780-in-pgadmin\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2025-13780\nhttp://repo.red-soft.ru/redos/8.0/x86_64/updates/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0423\u0411\u0414",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-94",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8.0)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9.1)"
}
FKIE_CVE-2025-13780
Vulnerability from fkie_nvd - Published: 2025-12-11 19:15 - Updated: 2025-12-19 19:51
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.
References
| URL | Tags | ||
|---|---|---|---|
| f86ef6dc-4d3a-42ad-8f28-e6d5547a5007 | https://github.com/pgadmin-org/pgadmin4/issues/9368 | Issue Tracking |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*",
"matchCriteriaId": "31BFDAD3-B87D-46DD-9984-3000087309DD",
"versionEndIncluding": "9.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data."
}
],
"id": "CVE-2025-13780",
"lastModified": "2025-12-19T19:51:13.657",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 5.3,
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-12-11T19:15:52.857",
"references": [
{
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/pgadmin-org/pgadmin4/issues/9368"
}
],
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-FXMW-JCGR-W44V
Vulnerability from github – Published: 2025-12-11 21:31 – Updated: 2025-12-12 16:42
VLAI?
Summary
pgadmin4 has a Meta-Command Filter Command Execution
Details
The PLAIN restore meta-command filter introduced in pgAdmin as part of the fix for CVE-2025-12762 does not detect meta-commands when a SQL file begins with a UTF-8 Byte Order Mark (EF BB BF) or other special byte sequences. The implemented filter uses the function has_meta_commands(), which scans raw bytes using a regular expression. The regex does not treat the bytes as ignorable, so meta-commands such as \\! remain undetected. When pgAdmin invokes psql with --file, psql strips the bytes and executes the command. This can result in remote command execution during a restore operation.
Severity ?
9.1 (Critical)
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "pgadmin4"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "9.11"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-13780"
],
"database_specific": {
"cwe_ids": [
"CWE-77",
"CWE-94"
],
"github_reviewed": true,
"github_reviewed_at": "2025-12-12T16:42:54Z",
"nvd_published_at": "2025-12-11T19:15:52Z",
"severity": "CRITICAL"
},
"details": "The PLAIN restore meta-command filter introduced in pgAdmin as part of the fix for CVE-2025-12762 does not detect meta-commands when a SQL file begins with a UTF-8 Byte Order Mark (EF BB BF) or other special byte sequences. The implemented filter uses the function `has_meta_commands()`, which scans raw bytes using a regular expression. The regex does not treat the bytes as ignorable, so meta-commands such as `\\\\!` remain undetected. When pgAdmin invokes psql with --file, psql strips the bytes and executes the command. This can result in remote command execution during a restore operation.",
"id": "GHSA-fxmw-jcgr-w44v",
"modified": "2025-12-12T16:42:54Z",
"published": "2025-12-11T21:31:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13780"
},
{
"type": "WEB",
"url": "https://github.com/pgadmin-org/pgadmin4/issues/9368"
},
{
"type": "WEB",
"url": "https://github.com/pgadmin-org/pgadmin4/pull/9426"
},
{
"type": "WEB",
"url": "https://github.com/pgadmin-org/pgadmin4/commit/1d397395f75320ca1d4ed5e9ca721c603415e836"
},
{
"type": "WEB",
"url": "https://github.com/pgadmin-org/pgadmin4/commit/d5a909f14cb9713d89b49481ad1929fad89f4576"
},
{
"type": "PACKAGE",
"url": "https://github.com/pgadmin-org/pgadmin4"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"type": "CVSS_V3"
}
],
"summary": "pgadmin4 has a Meta-Command Filter Command Execution"
}
OPENSUSE-SU-2025:15818-1
Vulnerability from csaf_opensuse - Published: 2025-12-12 00:00 - Updated: 2025-12-12 00:00Summary
pgadmin4-9.11-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: pgadmin4-9.11-1.1 on GA media
Description of the patch: These are all security issues fixed in the pgadmin4-9.11-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2025-15818
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
9.1 (Critical)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
8.8 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.5 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.4 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
9.1 (Critical)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
References
17 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "pgadmin4-9.11-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the pgadmin4-9.11-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15818",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15818-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-12762 page",
"url": "https://www.suse.com/security/cve/CVE-2025-12762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-12763 page",
"url": "https://www.suse.com/security/cve/CVE-2025-12763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-12764 page",
"url": "https://www.suse.com/security/cve/CVE-2025-12764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-12765 page",
"url": "https://www.suse.com/security/cve/CVE-2025-12765/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13780 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13780/"
}
],
"title": "pgadmin4-9.11-1.1 on GA media",
"tracking": {
"current_release_date": "2025-12-12T00:00:00Z",
"generator": {
"date": "2025-12-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15818-1",
"initial_release_date": "2025-12-12T00:00:00Z",
"revision_history": [
{
"date": "2025-12-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.11-1.1.aarch64",
"product": {
"name": "pgadmin4-9.11-1.1.aarch64",
"product_id": "pgadmin4-9.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.11-1.1.aarch64",
"product": {
"name": "pgadmin4-cloud-9.11-1.1.aarch64",
"product_id": "pgadmin4-cloud-9.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.11-1.1.aarch64",
"product": {
"name": "pgadmin4-desktop-9.11-1.1.aarch64",
"product_id": "pgadmin4-desktop-9.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.11-1.1.aarch64",
"product": {
"name": "pgadmin4-doc-9.11-1.1.aarch64",
"product_id": "pgadmin4-doc-9.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"product": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"product_id": "pgadmin4-web-uwsgi-9.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.11-1.1.aarch64",
"product": {
"name": "system-user-pgadmin-9.11-1.1.aarch64",
"product_id": "system-user-pgadmin-9.11-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.11-1.1.ppc64le",
"product": {
"name": "pgadmin4-9.11-1.1.ppc64le",
"product_id": "pgadmin4-9.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.11-1.1.ppc64le",
"product": {
"name": "pgadmin4-cloud-9.11-1.1.ppc64le",
"product_id": "pgadmin4-cloud-9.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.11-1.1.ppc64le",
"product": {
"name": "pgadmin4-desktop-9.11-1.1.ppc64le",
"product_id": "pgadmin4-desktop-9.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.11-1.1.ppc64le",
"product": {
"name": "pgadmin4-doc-9.11-1.1.ppc64le",
"product_id": "pgadmin4-doc-9.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"product": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"product_id": "pgadmin4-web-uwsgi-9.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.11-1.1.ppc64le",
"product": {
"name": "system-user-pgadmin-9.11-1.1.ppc64le",
"product_id": "system-user-pgadmin-9.11-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.11-1.1.s390x",
"product": {
"name": "pgadmin4-9.11-1.1.s390x",
"product_id": "pgadmin4-9.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.11-1.1.s390x",
"product": {
"name": "pgadmin4-cloud-9.11-1.1.s390x",
"product_id": "pgadmin4-cloud-9.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.11-1.1.s390x",
"product": {
"name": "pgadmin4-desktop-9.11-1.1.s390x",
"product_id": "pgadmin4-desktop-9.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.11-1.1.s390x",
"product": {
"name": "pgadmin4-doc-9.11-1.1.s390x",
"product_id": "pgadmin4-doc-9.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.11-1.1.s390x",
"product": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.s390x",
"product_id": "pgadmin4-web-uwsgi-9.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.11-1.1.s390x",
"product": {
"name": "system-user-pgadmin-9.11-1.1.s390x",
"product_id": "system-user-pgadmin-9.11-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.11-1.1.x86_64",
"product": {
"name": "pgadmin4-9.11-1.1.x86_64",
"product_id": "pgadmin4-9.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.11-1.1.x86_64",
"product": {
"name": "pgadmin4-cloud-9.11-1.1.x86_64",
"product_id": "pgadmin4-cloud-9.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.11-1.1.x86_64",
"product": {
"name": "pgadmin4-desktop-9.11-1.1.x86_64",
"product_id": "pgadmin4-desktop-9.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.11-1.1.x86_64",
"product": {
"name": "pgadmin4-doc-9.11-1.1.x86_64",
"product_id": "pgadmin4-doc-9.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"product": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"product_id": "pgadmin4-web-uwsgi-9.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.11-1.1.x86_64",
"product": {
"name": "system-user-pgadmin-9.11-1.1.x86_64",
"product_id": "system-user-pgadmin-9.11-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64"
},
"product_reference": "pgadmin4-9.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le"
},
"product_reference": "pgadmin4-9.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x"
},
"product_reference": "pgadmin4-9.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64"
},
"product_reference": "pgadmin4-9.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64"
},
"product_reference": "pgadmin4-cloud-9.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le"
},
"product_reference": "pgadmin4-cloud-9.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x"
},
"product_reference": "pgadmin4-cloud-9.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64"
},
"product_reference": "pgadmin4-cloud-9.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64"
},
"product_reference": "pgadmin4-desktop-9.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le"
},
"product_reference": "pgadmin4-desktop-9.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x"
},
"product_reference": "pgadmin4-desktop-9.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64"
},
"product_reference": "pgadmin4-desktop-9.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64"
},
"product_reference": "pgadmin4-doc-9.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le"
},
"product_reference": "pgadmin4-doc-9.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x"
},
"product_reference": "pgadmin4-doc-9.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64"
},
"product_reference": "pgadmin4-doc-9.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64"
},
"product_reference": "pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le"
},
"product_reference": "pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x"
},
"product_reference": "pgadmin4-web-uwsgi-9.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64"
},
"product_reference": "pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64"
},
"product_reference": "system-user-pgadmin-9.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le"
},
"product_reference": "system-user-pgadmin-9.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x"
},
"product_reference": "system-user-pgadmin-9.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
},
"product_reference": "system-user-pgadmin-9.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-12762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-12762"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-12762",
"url": "https://www.suse.com/security/cve/CVE-2025-12762"
},
{
"category": "external",
"summary": "SUSE Bug 1253474 for CVE-2025-12762",
"url": "https://bugzilla.suse.com/1253474"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-12762"
},
{
"cve": "CVE-2025-12763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-12763"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providing specially crafted file path input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-12763",
"url": "https://www.suse.com/security/cve/CVE-2025-12763"
},
{
"category": "external",
"summary": "SUSE Bug 1253476 for CVE-2025-12763",
"url": "https://bugzilla.suse.com/1253476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-12763"
},
{
"cve": "CVE-2025-12764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-12764"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin \u003c= 9.9 is affected by an LDAP injection vulnerability in the LDAP authentication flow that allows an attacker to inject special LDAP characters in the username, causing the DC/LDAP server and the client to process an unusual amount of data DOS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-12764",
"url": "https://www.suse.com/security/cve/CVE-2025-12764"
},
{
"category": "external",
"summary": "SUSE Bug 1253477 for CVE-2025-12764",
"url": "https://bugzilla.suse.com/1253477"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-12764"
},
{
"cve": "CVE-2025-12765",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-12765"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin \u003c= 9.9 is affected by a vulnerability in the LDAP authentication mechanism allows bypassing TLS certificate verification.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-12765",
"url": "https://www.suse.com/security/cve/CVE-2025-12765"
},
{
"category": "external",
"summary": "SUSE Bug 1253478 for CVE-2025-12765",
"url": "https://bugzilla.suse.com/1253478"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-12765"
},
{
"cve": "CVE-2025-13780",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13780"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13780",
"url": "https://www.suse.com/security/cve/CVE-2025-13780"
},
{
"category": "external",
"summary": "SUSE Bug 1254898 for CVE-2025-13780",
"url": "https://bugzilla.suse.com/1254898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-13780"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…