PT-2026-39623 · Pgadmin.Org · Pgadmin 4

Published

2026-05-11

·

Updated

2026-05-11

·

CVE-2026-7813

CVSS v3.1

9.9

Critical

VectorAV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Authorization vulnerability in pgAdmin 4 server mode affecting Server Groups, Servers, Shared Servers, Background Processes, and Debugger modules.
Multiple endpoints fetched user-owned objects without filtering by the requesting user's identity. An authenticated user could access another user's private servers, server groups, background processes, and debugger function arguments by guessing object IDs.
Additionally, the Shared Servers feature contained multiple issues including credential leakage (passexec cmd, passfile, SSL keys), privilege escalation via writable passexec cmd (a shell command executed when establishing the connection) allowing arbitrary command execution in the owner's process context, and owner-data corruption via SQLAlchemy session mutations. Several owner-only fields (passexec cmd, passexec expiration, db res, db res type) were writable by non-owners through the API, and additional fields (kerberos conn, tags, post connection sql) lacked per-user persistence so non-owner edits mutated the owner's record.
Fix centralises access control via a new server access module, scopes all user-owned models with a UserScopedMixin, returns HTTP 410 from connection manager when access is denied in server mode, suppresses owner-only fields for non-owners across the merge / API response / ServerManager paths, and adds an explicit owner-only write guard. The remediation landed in two pull requests; both are referenced.
This issue affects pgAdmin 4: before 9.15.

Fix

Related Identifiers

CVE-2026-7813

Affected Products

Pgadmin 4