PT-2026-39629 · Pgadmin.Org · Pgadmin 4

Fernando Bortotti

·

Published

2026-05-11

·

Updated

2026-05-11

·

CVE-2026-7819

CVSS v3.1

8.1

High

VectorAV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Symbolic-link path traversal (CWE-61, CWE-22) in pgAdmin 4 File Manager.
check access permission used os.path.abspath, which resolves '..' but does not resolve symbolic links, while the subsequent kernel write follows symlinks. An authenticated user could plant a symbolic link inside their own storage directory pointing outside it and induce pgAdmin to write to any path reachable by the pgAdmin process.
Fix switches the access check to os.path.realpath for both source and destination, and adds an open upload target helper that opens the target with O NOFOLLOW (mode 0o600) to close the leaf-component TOCTOU between the access check and the open. File mode is hardened from 0o644 to 0o600.
This issue affects pgAdmin 4: before 9.15.

Fix

Related Identifiers

CVE-2026-7819

Affected Products

Pgadmin 4