Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13780: Vulnerability in pgadmin.org pgAdmin 4

0
Critical
VulnerabilityCVE-2025-13780cvecve-2025-13780
Published: Thu Dec 11 2025 (12/11/2025, 18:30:47 UTC)
Source: CVE Database V5
Vendor/Project: pgadmin.org
Product: pgAdmin 4

Description

pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:29:31 UTC

Technical Analysis

CVE-2025-13780 is a critical security vulnerability affecting pgAdmin 4, a widely used open-source administration and management tool for PostgreSQL databases. The flaw exists in versions up to 9.10 when pgAdmin is operated in server mode and a database restore is performed using PLAIN-format dump files. The vulnerability allows an attacker with limited privileges to perform Remote Code Execution (RCE) by injecting arbitrary commands during the restore process. This occurs due to improper validation and sanitization of input data, leading to unsafe code generation or execution (CWE-94). The vulnerability is exploitable remotely over the network without requiring user interaction, but it does require some level of privileges on the pgAdmin server (PR:L). The CVSS v3.1 base score of 9.1 indicates a critical severity, with network attack vector (AV:N), low attack complexity (AC:L), partial privileges required, no user interaction, and scope change (S:C). The impact on confidentiality is high, as attackers can access sensitive database information or execute arbitrary commands, potentially compromising the entire server. Integrity and availability impacts are also significant, as attackers can alter or disrupt database operations. Although no known exploits are currently reported in the wild, the vulnerability poses a severe risk to organizations relying on pgAdmin 4 for database management. The lack of an official patch at the time of disclosure necessitates immediate mitigation efforts to prevent exploitation.

Potential Impact

The potential impact of CVE-2025-13780 is severe for organizations worldwide using pgAdmin 4 in server mode. Successful exploitation allows attackers to execute arbitrary code on the database server, potentially leading to full system compromise. This can result in unauthorized data access, data manipulation, disruption of database services, and lateral movement within the network. The confidentiality of sensitive business and customer data is at high risk, as is the integrity of critical database operations. Availability may also be affected if attackers disrupt or disable database services. Organizations in sectors such as finance, healthcare, government, and technology that rely heavily on PostgreSQL and pgAdmin for critical data management are particularly vulnerable. The ease of exploitation combined with the critical severity score underscores the urgency for remediation. Additionally, compromised database servers can serve as pivot points for broader network attacks, increasing the overall organizational risk.

Mitigation Recommendations

To mitigate the risk posed by CVE-2025-13780, organizations should implement the following specific measures: 1) Immediately restrict access to pgAdmin 4 server instances to trusted administrators only, using network segmentation and firewall rules to limit exposure. 2) Disable or avoid performing restores from PLAIN-format dump files in pgAdmin until a vendor patch is released. 3) Monitor and audit pgAdmin server logs for unusual restore operations or command executions. 4) Apply the official security patch from pgadmin.org as soon as it becomes available. 5) Employ the principle of least privilege by ensuring that users with access to pgAdmin have minimal necessary permissions, reducing the risk of privilege escalation. 6) Consider using alternative database management tools or command-line utilities for restore operations if immediate patching is not feasible. 7) Regularly update and harden the underlying operating system and PostgreSQL server to reduce the attack surface. 8) Implement intrusion detection and prevention systems to detect anomalous behavior related to database restores or command execution. These targeted actions go beyond generic advice and address the specific attack vector and environment of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
PostgreSQL
Date Reserved
2025-11-28T17:30:53.262Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b0fc17d4c6f31f7bf9f0b

Added to database: 12/11/2025, 6:38:57 PM

Last enriched: 2/27/2026, 6:29:31 AM

Last updated: 3/25/2026, 4:11:33 AM

Views: 534

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses