Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-12762 (GCVE-0-2025-12762)
Vulnerability from cvelistv5 – Published: 2025-11-13 13:00 – Updated: 2026-02-26 16:57
VLAI?
EPSS
Title
Remote Code Execution vulnerability when restoring PLAIN-format SQL dumps in server mode (pgAdmin 4)
Summary
pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.
Severity ?
9.1 (Critical)
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://github.com/pgadmin-org/pgadmin4/issues/9320 | issue-tracking |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| pgadmin.org | pgAdmin 4 |
Affected:
0 , ≤ 9.9
(custom)
|
Date Public ?
2025-11-05 10:54
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-12762",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-14T04:55:28.348755Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T16:57:07.296Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"Restore"
],
"product": "pgAdmin 4",
"programFiles": [
"https://github.com/pgadmin-org/pgadmin4/blob/master/web/pgadmin/tools/restore/__init__.py"
],
"repo": "https://github.com/pgadmin-org/pgadmin4",
"vendor": "pgadmin.org",
"versions": [
{
"lessThanOrEqual": "9.9",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2025-11-05T10:54:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.\u003cbr\u003e"
}
],
"value": "pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-13T13:00:02.005Z",
"orgId": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"shortName": "PostgreSQL"
},
"references": [
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/pgadmin-org/pgadmin4/issues/9320"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Remote Code Execution vulnerability when restoring PLAIN-format SQL dumps in server mode (pgAdmin 4)",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"assignerShortName": "PostgreSQL",
"cveId": "CVE-2025-12762",
"datePublished": "2025-11-13T13:00:02.005Z",
"dateReserved": "2025-11-05T17:30:05.059Z",
"dateUpdated": "2026-02-26T16:57:07.296Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-12762",
"date": "2026-05-21",
"epss": "0.00174",
"percentile": "0.38352"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-12762\",\"sourceIdentifier\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"published\":\"2025-11-13T13:15:44.620\",\"lastModified\":\"2025-12-01T20:15:49.347\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.1,\"impactScore\":5.3},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*\",\"versionEndExcluding\":\"9.10\",\"matchCriteriaId\":\"869DC8C4-E456-4D31-964B-96D4B9B8F4A2\"}]}]}],\"references\":[{\"url\":\"https://github.com/pgadmin-org/pgadmin4/issues/9320\",\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"modules\": [\"Restore\"], \"product\": \"pgAdmin 4\", \"programFiles\": [\"https://github.com/pgadmin-org/pgadmin4/blob/master/web/pgadmin/tools/restore/__init__.py\"], \"repo\": \"https://github.com/pgadmin-org/pgadmin4\", \"vendor\": \"pgadmin.org\", \"versions\": [{\"lessThanOrEqual\": \"9.9\", \"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\"}]}], \"datePublic\": \"2025-11-05T10:54:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.\u003cbr\u003e\"}], \"value\": \"pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"LOW\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"scope\": \"CHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L\", \"version\": \"3.1\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"providerMetadata\": {\"orgId\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"shortName\": \"PostgreSQL\", \"dateUpdated\": \"2025-11-13T13:00:02.005Z\"}, \"references\": [{\"tags\": [\"issue-tracking\"], \"url\": \"https://github.com/pgadmin-org/pgadmin4/issues/9320\"}], \"source\": {\"discovery\": \"UNKNOWN\"}, \"title\": \"Remote Code Execution vulnerability when restoring PLAIN-format SQL dumps in server mode (pgAdmin 4)\", \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-12762\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-11-14T04:55:28.348755Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-94\", \"description\": \"CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-01T19:13:59.830Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2025-12762\", \"assignerOrgId\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"PostgreSQL\", \"dateReserved\": \"2025-11-05T17:30:05.059Z\", \"datePublished\": \"2025-11-13T13:00:02.005Z\", \"dateUpdated\": \"2026-02-26T16:57:07.296Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
BDU:2025-14360
Vulnerability from fstec - Published: 04.11.2025
VLAI Severity ?
Title
Уязвимость инструмента управления базами данных pgAdmin 4, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
Description
Уязвимость инструмента управления базами данных pgAdmin 4 связана с неверным управлением генерацией кода. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить произвольный код при восстановлении данных из PLAIN-файлов
Severity ?
Vendor
PostgreSQL Community Association of Canada
Software Name
pgAdmin 4
Software Version
до 9.10 (pgAdmin 4)
Possible Mitigations
Установка обновлений из доверенных источников. В связи со сложившейся обстановкой и введенными санкциями против Российской Федерации рекомендуется устанавливать обновления программного обеспечения только после оценки всех сопутствующих рисков.
Компенсирующие меры:
- использование антивирусного программного обеспечения для проверки файлов, полученных из недоверенных источников;
- использование замкнутой программной среды для работы с файлами, полученными из недоверенных источников;
- использование средств межсетевого экранирования для ограничения удаленного доступа к уязвимому программному обеспечению;
- использование SIEM-систем для отслеживания событий, связанных с восстановлением данных из PLAIN-файлов;
- ограничение доступа из внешних сетей (Интернет);
- сегментирование сети для ограничения доступа к уязвимому программному обеспечению;
- использование виртуальных частных сетей для организации удаленного доступа (VPN).
Использование рекомендаций производителя:
Обновление программного обеспечения до версии 9.10 и выше
https://github.com/pgadmin-org/pgadmin4/issues/9320
Reference
https://github.com/pgadmin-org/pgadmin4/issues/9320
CWE
CWE-94
{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:C/I:P/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "TO2392",
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": "TO2392 \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 pgAdmin 4",
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "PostgreSQL Community Association of Canada",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 9.10 (pgAdmin 4)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432. \u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0444\u0430\u0439\u043b\u043e\u0432, \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u0445 \u0438\u0437 \u043d\u0435\u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0437\u0430\u043c\u043a\u043d\u0443\u0442\u043e\u0439 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u044b \u0434\u043b\u044f \u0440\u0430\u0431\u043e\u0442\u044b \u0441 \u0444\u0430\u0439\u043b\u0430\u043c\u0438, \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u043c\u0438 \u0438\u0437 \u043d\u0435\u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 SIEM-\u0441\u0438\u0441\u0442\u0435\u043c \u0434\u043b\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u0441\u043e\u0431\u044b\u0442\u0438\u0439, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u0437 PLAIN-\u0444\u0430\u0439\u043b\u043e\u0432;\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438\u0437 \u0432\u043d\u0435\u0448\u043d\u0438\u0445 \u0441\u0435\u0442\u0435\u0439 (\u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442);\n- \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0447\u0430\u0441\u0442\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0434\u043b\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (VPN).\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 9.10 \u0438 \u0432\u044b\u0448\u0435\nhttps://github.com/pgadmin-org/pgadmin4/issues/9320",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "04.11.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "17.11.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "17.11.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-14360",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-12762",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "pgAdmin 4",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 pgAdmin 4, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0435\u0439 \u043a\u043e\u0434\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0432\u0435\u0440\u043d\u043e\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0435\u0439 \u043a\u043e\u0434\u0430 (\u0412\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430) (CWE-94)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 pgAdmin 4 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0435\u0439 \u043a\u043e\u0434\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043f\u0440\u0438 \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u0437 PLAIN-\u0444\u0430\u0439\u043b\u043e\u0432",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/pgadmin-org/pgadmin4/issues/9320",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0423\u0411\u0414",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-94",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,1)"
}
FKIE_CVE-2025-12762
Vulnerability from fkie_nvd - Published: 2025-11-13 13:15 - Updated: 2025-12-01 20:15
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.
References
| URL | Tags | ||
|---|---|---|---|
| f86ef6dc-4d3a-42ad-8f28-e6d5547a5007 | https://github.com/pgadmin-org/pgadmin4/issues/9320 | Issue Tracking, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*",
"matchCriteriaId": "869DC8C4-E456-4D31-964B-96D4B9B8F4A2",
"versionEndExcluding": "9.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data."
}
],
"id": "CVE-2025-12762",
"lastModified": "2025-12-01T20:15:49.347",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 5.3,
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-11-13T13:15:44.620",
"references": [
{
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/pgadmin-org/pgadmin4/issues/9320"
}
],
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-W2P4-P4RH-QCM3
Vulnerability from github – Published: 2025-11-13 15:30 – Updated: 2025-11-13 17:39
VLAI?
Summary
pgAdmin4 vulnerable to Remote Code Execution (RCE) when running in server mode
Details
pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.
Severity ?
9.1 (Critical)
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "pgadmin4"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "9.10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-12762"
],
"database_specific": {
"cwe_ids": [
"CWE-94"
],
"github_reviewed": true,
"github_reviewed_at": "2025-11-13T17:39:17Z",
"nvd_published_at": "2025-11-13T13:15:44Z",
"severity": "CRITICAL"
},
"details": "pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.",
"id": "GHSA-w2p4-p4rh-qcm3",
"modified": "2025-11-13T17:39:17Z",
"published": "2025-11-13T15:30:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12762"
},
{
"type": "WEB",
"url": "https://github.com/pgadmin-org/pgadmin4/issues/9320"
},
{
"type": "WEB",
"url": "https://github.com/pgadmin-org/pgadmin4/commit/1d397395f75320ca1d4ed5e9ca721c603415e836"
},
{
"type": "PACKAGE",
"url": "https://github.com/pgadmin-org/pgadmin4"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"type": "CVSS_V3"
}
],
"summary": "pgAdmin4 vulnerable to Remote Code Execution (RCE) when running in server mode"
}
OPENSUSE-SU-2025:15818-1
Vulnerability from csaf_opensuse - Published: 2025-12-12 00:00 - Updated: 2025-12-12 00:00Summary
pgadmin4-9.11-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: pgadmin4-9.11-1.1 on GA media
Description of the patch: These are all security issues fixed in the pgadmin4-9.11-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2025-15818
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
9.1 (Critical)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
8.8 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.5 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.4 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
9.1 (Critical)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
References
17 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "pgadmin4-9.11-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the pgadmin4-9.11-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15818",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15818-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-12762 page",
"url": "https://www.suse.com/security/cve/CVE-2025-12762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-12763 page",
"url": "https://www.suse.com/security/cve/CVE-2025-12763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-12764 page",
"url": "https://www.suse.com/security/cve/CVE-2025-12764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-12765 page",
"url": "https://www.suse.com/security/cve/CVE-2025-12765/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13780 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13780/"
}
],
"title": "pgadmin4-9.11-1.1 on GA media",
"tracking": {
"current_release_date": "2025-12-12T00:00:00Z",
"generator": {
"date": "2025-12-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15818-1",
"initial_release_date": "2025-12-12T00:00:00Z",
"revision_history": [
{
"date": "2025-12-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.11-1.1.aarch64",
"product": {
"name": "pgadmin4-9.11-1.1.aarch64",
"product_id": "pgadmin4-9.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.11-1.1.aarch64",
"product": {
"name": "pgadmin4-cloud-9.11-1.1.aarch64",
"product_id": "pgadmin4-cloud-9.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.11-1.1.aarch64",
"product": {
"name": "pgadmin4-desktop-9.11-1.1.aarch64",
"product_id": "pgadmin4-desktop-9.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.11-1.1.aarch64",
"product": {
"name": "pgadmin4-doc-9.11-1.1.aarch64",
"product_id": "pgadmin4-doc-9.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"product": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"product_id": "pgadmin4-web-uwsgi-9.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.11-1.1.aarch64",
"product": {
"name": "system-user-pgadmin-9.11-1.1.aarch64",
"product_id": "system-user-pgadmin-9.11-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.11-1.1.ppc64le",
"product": {
"name": "pgadmin4-9.11-1.1.ppc64le",
"product_id": "pgadmin4-9.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.11-1.1.ppc64le",
"product": {
"name": "pgadmin4-cloud-9.11-1.1.ppc64le",
"product_id": "pgadmin4-cloud-9.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.11-1.1.ppc64le",
"product": {
"name": "pgadmin4-desktop-9.11-1.1.ppc64le",
"product_id": "pgadmin4-desktop-9.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.11-1.1.ppc64le",
"product": {
"name": "pgadmin4-doc-9.11-1.1.ppc64le",
"product_id": "pgadmin4-doc-9.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"product": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"product_id": "pgadmin4-web-uwsgi-9.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.11-1.1.ppc64le",
"product": {
"name": "system-user-pgadmin-9.11-1.1.ppc64le",
"product_id": "system-user-pgadmin-9.11-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.11-1.1.s390x",
"product": {
"name": "pgadmin4-9.11-1.1.s390x",
"product_id": "pgadmin4-9.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.11-1.1.s390x",
"product": {
"name": "pgadmin4-cloud-9.11-1.1.s390x",
"product_id": "pgadmin4-cloud-9.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.11-1.1.s390x",
"product": {
"name": "pgadmin4-desktop-9.11-1.1.s390x",
"product_id": "pgadmin4-desktop-9.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.11-1.1.s390x",
"product": {
"name": "pgadmin4-doc-9.11-1.1.s390x",
"product_id": "pgadmin4-doc-9.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.11-1.1.s390x",
"product": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.s390x",
"product_id": "pgadmin4-web-uwsgi-9.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.11-1.1.s390x",
"product": {
"name": "system-user-pgadmin-9.11-1.1.s390x",
"product_id": "system-user-pgadmin-9.11-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.11-1.1.x86_64",
"product": {
"name": "pgadmin4-9.11-1.1.x86_64",
"product_id": "pgadmin4-9.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.11-1.1.x86_64",
"product": {
"name": "pgadmin4-cloud-9.11-1.1.x86_64",
"product_id": "pgadmin4-cloud-9.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.11-1.1.x86_64",
"product": {
"name": "pgadmin4-desktop-9.11-1.1.x86_64",
"product_id": "pgadmin4-desktop-9.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.11-1.1.x86_64",
"product": {
"name": "pgadmin4-doc-9.11-1.1.x86_64",
"product_id": "pgadmin4-doc-9.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"product": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"product_id": "pgadmin4-web-uwsgi-9.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.11-1.1.x86_64",
"product": {
"name": "system-user-pgadmin-9.11-1.1.x86_64",
"product_id": "system-user-pgadmin-9.11-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64"
},
"product_reference": "pgadmin4-9.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le"
},
"product_reference": "pgadmin4-9.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x"
},
"product_reference": "pgadmin4-9.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64"
},
"product_reference": "pgadmin4-9.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64"
},
"product_reference": "pgadmin4-cloud-9.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le"
},
"product_reference": "pgadmin4-cloud-9.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x"
},
"product_reference": "pgadmin4-cloud-9.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64"
},
"product_reference": "pgadmin4-cloud-9.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64"
},
"product_reference": "pgadmin4-desktop-9.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le"
},
"product_reference": "pgadmin4-desktop-9.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x"
},
"product_reference": "pgadmin4-desktop-9.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64"
},
"product_reference": "pgadmin4-desktop-9.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64"
},
"product_reference": "pgadmin4-doc-9.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le"
},
"product_reference": "pgadmin4-doc-9.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x"
},
"product_reference": "pgadmin4-doc-9.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64"
},
"product_reference": "pgadmin4-doc-9.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64"
},
"product_reference": "pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le"
},
"product_reference": "pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x"
},
"product_reference": "pgadmin4-web-uwsgi-9.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64"
},
"product_reference": "pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64"
},
"product_reference": "system-user-pgadmin-9.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le"
},
"product_reference": "system-user-pgadmin-9.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x"
},
"product_reference": "system-user-pgadmin-9.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
},
"product_reference": "system-user-pgadmin-9.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-12762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-12762"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-12762",
"url": "https://www.suse.com/security/cve/CVE-2025-12762"
},
{
"category": "external",
"summary": "SUSE Bug 1253474 for CVE-2025-12762",
"url": "https://bugzilla.suse.com/1253474"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-12762"
},
{
"cve": "CVE-2025-12763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-12763"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providing specially crafted file path input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-12763",
"url": "https://www.suse.com/security/cve/CVE-2025-12763"
},
{
"category": "external",
"summary": "SUSE Bug 1253476 for CVE-2025-12763",
"url": "https://bugzilla.suse.com/1253476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-12763"
},
{
"cve": "CVE-2025-12764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-12764"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin \u003c= 9.9 is affected by an LDAP injection vulnerability in the LDAP authentication flow that allows an attacker to inject special LDAP characters in the username, causing the DC/LDAP server and the client to process an unusual amount of data DOS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-12764",
"url": "https://www.suse.com/security/cve/CVE-2025-12764"
},
{
"category": "external",
"summary": "SUSE Bug 1253477 for CVE-2025-12764",
"url": "https://bugzilla.suse.com/1253477"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-12764"
},
{
"cve": "CVE-2025-12765",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-12765"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin \u003c= 9.9 is affected by a vulnerability in the LDAP authentication mechanism allows bypassing TLS certificate verification.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-12765",
"url": "https://www.suse.com/security/cve/CVE-2025-12765"
},
{
"category": "external",
"summary": "SUSE Bug 1253478 for CVE-2025-12765",
"url": "https://bugzilla.suse.com/1253478"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-12765"
},
{
"cve": "CVE-2025-13780",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13780"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13780",
"url": "https://www.suse.com/security/cve/CVE-2025-13780"
},
{
"category": "external",
"summary": "SUSE Bug 1254898 for CVE-2025-13780",
"url": "https://bugzilla.suse.com/1254898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.11-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.11-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-13780"
}
]
}
WID-SEC-W-2025-2593
Vulnerability from csaf_certbund - Published: 2025-11-12 23:00 - Updated: 2026-01-05 23:00Summary
pgAdmin: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: pgAdmin ist eine Verwaltungs- und Entwicklungsplattform für die PostgreSQL-Datenbank.
Angriff: Ein Angreifer kann mehrere Schwachstellen in pgAdmin ausnutzen, um beliebigen Code auszuführen, Betriebssystembefehle auszuführen oder die Authentifizierung zu umgehen.
Betroffene Betriebssysteme: - Sonstiges
- UNIX
- Windows
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Open Source pgAdmin <4 v9.10
Open Source / pgAdmin
|
<4 v9.10 | ||
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Open Source pgAdmin <4 v9.10
Open Source / pgAdmin
|
<4 v9.10 | ||
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Open Source pgAdmin <4 v9.10
Open Source / pgAdmin
|
<4 v9.10 | ||
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Open Source pgAdmin <4 v9.10
Open Source / pgAdmin
|
<4 v9.10 | ||
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
References
6 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "pgAdmin ist eine Verwaltungs- und Entwicklungsplattform f\u00fcr die PostgreSQL-Datenbank.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in pgAdmin ausnutzen, um beliebigen Code auszuf\u00fchren, Betriebssystembefehle auszuf\u00fchren oder die Authentifizierung zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2593 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2593.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2593 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2593"
},
{
"category": "external",
"summary": "pgAdmin Release Notes vom 2025-11-12",
"url": "http://www.pgadmin.org/news/#117"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15818-1 vom 2025-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D2BCQRORIDC35GDELYUAZUFHCTPTLE3B/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0015-1 vom 2026-01-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023673.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0016-1 vom 2026-01-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023672.html"
}
],
"source_lang": "en-US",
"title": "pgAdmin: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-01-05T23:00:00.000+00:00",
"generator": {
"date": "2026-01-06T08:36:16.742+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2593",
"initial_release_date": "2025-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-13T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-169296, EUVD-2025-169295, EUVD-2025-169294, EUVD-2025-169293"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4 v9.10",
"product": {
"name": "Open Source pgAdmin \u003c4 v9.10",
"product_id": "T048593"
}
},
{
"category": "product_version",
"name": "4 v9.10",
"product": {
"name": "Open Source pgAdmin 4 v9.10",
"product_id": "T048593-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:pgadmin:pgadmin:4_v9.10"
}
}
}
],
"category": "product_name",
"name": "pgAdmin"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-12762",
"product_status": {
"known_affected": [
"T002207",
"T048593",
"T027843"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-12762"
},
{
"cve": "CVE-2025-12763",
"product_status": {
"known_affected": [
"T002207",
"T048593",
"T027843"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-12763"
},
{
"cve": "CVE-2025-12764",
"product_status": {
"known_affected": [
"T002207",
"T048593",
"T027843"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-12764"
},
{
"cve": "CVE-2025-12765",
"product_status": {
"known_affected": [
"T002207",
"T048593",
"T027843"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-12765"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…