Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1707: Vulnerability in pgadmin.org pgAdmin 4

0
High
VulnerabilityCVE-2026-1707cvecve-2026-1707
Published: Thu Feb 05 2026 (02/05/2026, 17:30:05 UTC)
Source: CVE Database V5
Vendor/Project: pgadmin.org
Product: pgAdmin 4

Description

pgAdmin versions 9.11 are affected by a Restore restriction bypass via key disclosure vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. An attacker with access to the pgAdmin web interface can observe an active restore operation, extract the `\restrict` key in real time, and race the restore process by overwriting the restore script with a payload that re-enables meta-commands using `\unrestrict <key>`. This results in reliable command execution on the pgAdmin host during the restore operation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:12:26 UTC

Technical Analysis

CVE-2026-1707 affects pgAdmin 4 version 9.11 when running in server mode and performing restores from PLAIN-format dump files. The vulnerability arises from a Restore restriction bypass via key disclosure. During a restore operation, an attacker with access to the pgAdmin web interface can observe the restore process in real time and extract the '\restrict' key, which is intended to disable meta-commands for security during restore. The attacker then races the restore operation by overwriting the restore script with a payload that uses the '\unrestrict <key>' meta-command to re-enable meta-commands. This bypass allows execution of arbitrary commands on the host running pgAdmin, effectively leading to command execution with the privileges of the pgAdmin process. The vulnerability is classified under CWE-284 (Improper Access Control). The CVSS v3.1 base score is 7.4, indicating high severity, with attack vector network, low attack complexity, requiring privileges but no user interaction, and scope changed due to impact beyond the vulnerable component. No patches are currently linked, and no known exploits are reported in the wild as of the publication date. This vulnerability poses a significant risk to organizations using pgAdmin 4 for managing PostgreSQL databases, especially in multi-user or exposed environments.

Potential Impact

The vulnerability allows an authenticated attacker with access to the pgAdmin web interface to execute arbitrary commands on the host system during a database restore operation. This can lead to full compromise of the pgAdmin server, including unauthorized data access, modification, or deletion, and potential lateral movement within the network. The confidentiality, integrity, and availability of the database and host system are at risk. Since pgAdmin is widely used for PostgreSQL database management, exploitation could disrupt critical database operations and lead to data breaches or service outages. The requirement for authenticated access limits the attack surface but does not eliminate significant risk, especially in environments where multiple users have access or where the web interface is exposed to untrusted networks. The race condition aspect may require some timing skill but is considered low complexity. Overall, this vulnerability could have severe operational and security impacts on organizations relying on pgAdmin 4 for database administration.

Mitigation Recommendations

Organizations should immediately review access controls to the pgAdmin web interface to restrict access to trusted users only. Network-level protections such as VPNs or IP whitelisting should be enforced to limit exposure. Since no patches are currently linked, consider temporarily disabling restore operations from PLAIN-format dump files or restricting restore functionality to highly trusted administrators. Monitor restore operations closely for suspicious activity or unexpected command executions. Employ host-based intrusion detection systems to detect anomalous commands or process behavior during restore operations. Segregate the pgAdmin server from critical production systems to limit potential impact. Stay alert for official patches or updates from pgadmin.org and apply them promptly once available. Additionally, consider upgrading to later versions of pgAdmin once the vulnerability is addressed. Implement strong authentication and session management to prevent unauthorized access to the web interface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
PostgreSQL
Date Reserved
2026-01-30T16:26:58.194Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6984daa9f9fa50a62f30a65b

Added to database: 2/5/2026, 6:00:09 PM

Last enriched: 2/26/2026, 11:12:26 PM

Last updated: 3/22/2026, 4:02:34 PM

Views: 240

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses