Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-7819: Vulnerability in pgadmin.org pgAdmin 4

0
High
VulnerabilityCVE-2026-7819cvecve-2026-7819
Published: Mon May 11 2026 (05/11/2026, 14:35:52 UTC)
Source: CVE Database V5
Vendor/Project: pgadmin.org
Product: pgAdmin 4

Description

CVE-2026-7819 is a high-severity vulnerability in pgAdmin 4 before version 9. 15 involving symbolic-link path traversal in the File Manager. The issue arises because the access permission check uses os. path. abspath, which does not resolve symbolic links, allowing an authenticated user to create a symlink pointing outside their storage directory. This can cause pgAdmin to write files to arbitrary locations accessible by the process. The fix involves switching to os. path. realpath for access checks and using O_NOFOLLOW to prevent symlink following during file open operations, as well as tightening file permissions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/11/2026, 15:51:38 UTC

Technical Analysis

The vulnerability in pgAdmin 4's File Manager is due to improper handling of symbolic links during access permission checks. The function check_access_permission uses os.path.abspath, which resolves '..' components but does not resolve symbolic links, while the kernel write operation follows symlinks. This discrepancy allows an authenticated user to plant a symbolic link inside their storage directory that points outside it, causing pgAdmin to write files to unintended paths. The patch changes the access check to use os.path.realpath for both source and destination paths and introduces an _open_upload_target helper that opens the target file with the O_NOFOLLOW flag to prevent TOCTOU (time-of-check to time-of-use) race conditions. File permissions are also hardened from 0o644 to 0o600. This vulnerability affects all versions of pgAdmin 4 prior to 9.15.

Potential Impact

An authenticated user with access to pgAdmin 4 can exploit this vulnerability to cause the application to write files to arbitrary locations on the filesystem accessible by the pgAdmin process. This can lead to integrity violations and potentially denial of service or privilege escalation depending on the environment and file targets. The CVSS 3.1 score is 8.1 (High), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and impact on integrity and availability.

Mitigation Recommendations

The vulnerability is fixed in pgAdmin 4 version 9.15 by switching to os.path.realpath for access checks and using O_NOFOLLOW when opening files to prevent symlink following. File permissions are also hardened. Since no official patch link or advisory is provided in the input, users should upgrade to pgAdmin 4 version 9.15 or later where this fix is implemented. Patch status is not yet confirmed from vendor advisory; check the official pgAdmin.org resources for the latest remediation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
PostgreSQL
Date Reserved
2026-05-04T21:27:00.366Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null

Threat ID: 6a01f795cbff5d86102f2199

Added to database: 5/11/2026, 3:36:53 PM

Last enriched: 5/11/2026, 3:51:38 PM

Last updated: 5/11/2026, 6:24:18 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses