PT-2025-50670 · Pgadmin+1 · Pgadmin+1

Published

2025-12-11

·

Updated

2026-03-10

·

CVE-2025-13780

CVSS v3.1

9.1

Critical

AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
Name of the Vulnerable Software and Affected Versions pgAdmin versions up to 9.10
Description pgAdmin versions up to 9.10 are susceptible to a Remote Code Execution (RCE) issue when running in server mode and restoring from PLAIN-format dump files. This flaw allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin. The issue arises from a failure in the application's regex filter to properly block dangerous commands hidden within uploaded database files. Specifically, the has meta commands() function used a regex pattern that did not account for carriage return characters (CR), allowing attackers to bypass the filter by inserting CRLF sequences into SQL dump files. This enables the execution of shell commands with the privileges of the pgAdmin process on the host system. Approximately 41,200 instances are exposed. The vulnerability allows attackers to execute shell commands on the host system via crafted restore files. The vulnerable component is the plain-text restore feature.
Recommendations Upgrade to pgAdmin version 9.11 or later.

Fix

RCE

Code Injection

Weakness Enumeration

Related Identifiers

BDU:2025-15881
CVE-2025-13780
GHSA-FXMW-JCGR-W44V
OPENSUSE-SU-2025:15818-1

Affected Products

Pgadmin
Red Os