The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server.
History

Mon, 14 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 17 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Pgadmin
Pgadmin pgadmin 4
CPEs cpe:2.3:a:postgresql:pgadmin:*:*:*:*:*:*:*:* cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*
Vendors & Products Postgresql
Postgresql pgadmin
Pgadmin
Pgadmin pgadmin 4

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2022-12-13T00:00:00.000Z

Updated: 2025-04-14T18:12:15.226Z

Reserved: 2022-11-30T00:00:00.000Z

Link: CVE-2022-4223

cve-icon Vulnrichment

Updated: 2024-08-03T01:34:49.614Z

cve-icon NVD

Status : Modified

Published: 2022-12-13T16:15:26.277

Modified: 2025-04-14T19:15:34.730

Link: CVE-2022-4223

cve-icon Redhat

Severity : Important

Publid Date: 2022-12-02T00:00:00Z

Links: CVE-2022-4223 - Bugzilla