Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2945: Vulnerability in pgadmin.org pgAdmin 4

0
Critical
VulnerabilityCVE-2025-2945cvecve-2025-2945
Published: Thu Apr 03 2025 (04/03/2025, 12:23:14 UTC)
Source: CVE Database V5
Vendor/Project: pgadmin.org
Product: pgAdmin 4

Description

Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules). The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution. This issue affects pgAdmin 4: before 9.2.

AI-Powered Analysis

AILast updated: 02/26/2026, 20:00:55 UTC

Technical Analysis

CVE-2025-2945 is a critical remote code execution (RCE) vulnerability identified in pgAdmin 4, a widely used open-source management tool for PostgreSQL databases. The flaw exists in two POST endpoints: /sqleditor/query_tool/download and /cloud/deploy. Specifically, the vulnerability stems from the unsafe use of Python's eval() function on user-controlled parameters—query_commited and high_availability, respectively. Eval() executes the input as Python code without proper sanitization or validation, enabling an attacker to inject and execute arbitrary Python code on the server hosting pgAdmin 4. This vulnerability affects all versions before 9.2. Exploitation requires low privileges (PR:L) but no user interaction (UI:N), and the attack can be launched remotely over the network (AV:N). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected system, as attackers can execute arbitrary commands, potentially leading to full system compromise, data theft, or service disruption. Although no known exploits are currently reported in the wild, the critical CVSS score of 9.9 highlights the severe risk posed by this flaw. The root cause is classified under CWE-94 (Improper Control of Generation of Code), a common and dangerous coding error. The vulnerability is particularly concerning in cloud deployment scenarios and multi-tenant environments where pgAdmin 4 is used to manage PostgreSQL instances, as attackers could leverage this flaw to pivot within networks or escalate privileges. No official patches or mitigations are listed in the provided data, but upgrading to pgAdmin 4 version 9.2 or later is implied as the fix. The PostgreSQL community and administrators must prioritize addressing this vulnerability to prevent potential exploitation.

Potential Impact

The impact of CVE-2025-2945 is severe and multifaceted. Successful exploitation allows remote attackers with low privileges to execute arbitrary code on the pgAdmin 4 server, potentially gaining full control over the host system. This can lead to unauthorized data access, modification, or deletion, compromising confidentiality and integrity. Additionally, attackers could disrupt database management operations or the underlying server, affecting availability. In cloud or multi-tenant environments, the vulnerability could facilitate lateral movement or privilege escalation, increasing the attack surface. Organizations relying on pgAdmin 4 for critical database administration, especially those managing sensitive or regulated data, face risks of data breaches, operational downtime, and reputational damage. The ease of exploitation and lack of required user interaction exacerbate the threat, making automated attacks feasible. Although no exploits are currently known in the wild, the vulnerability's critical nature demands immediate attention to prevent potential widespread attacks.

Mitigation Recommendations

To mitigate CVE-2025-2945, organizations should immediately upgrade pgAdmin 4 to version 9.2 or later, where the vulnerability is addressed. Until the upgrade is applied, restrict network access to the vulnerable endpoints (/sqleditor/query_tool/download and /cloud/deploy) using firewalls, web application firewalls (WAFs), or network segmentation to limit exposure. Implement strict access controls and authentication mechanisms to reduce the risk of unauthorized access. Monitor logs for suspicious POST requests targeting these endpoints, especially those containing unusual payloads in the query_commited or high_availability parameters. Employ runtime application self-protection (RASP) or intrusion detection systems (IDS) to detect and block attempts to exploit eval() injection. Review and sanitize all user inputs rigorously in custom deployments or extensions of pgAdmin 4 to prevent similar code injection flaws. Educate administrators about the risks of unsafe eval() usage and encourage secure coding practices. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
PostgreSQL
Date Reserved
2025-03-29T01:38:35.441Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1c385912abc71d0b6bb

Added to database: 2/26/2026, 7:40:51 PM

Last enriched: 2/26/2026, 8:00:55 PM

Last updated: 2/26/2026, 11:11:13 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses