Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules). The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution. This issue affects pgAdmin 4: before 9.2.
History

Thu, 03 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94

Thu, 03 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 03 Apr 2025 12:30:00 +0000

Type Values Removed Values Added
Description Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules). The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution. This issue affects pgAdmin 4: before 9.2.
Title pgAdmin 4: Remote Code Execution in Query Tool and Cloud Deployment
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PostgreSQL

Published: 2025-04-03T12:23:14.792Z

Updated: 2025-04-04T03:55:25.268Z

Reserved: 2025-03-29T01:38:35.441Z

Link: CVE-2025-2945

cve-icon Vulnrichment

Updated: 2025-04-03T13:15:19.164Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-03T13:15:43.240

Modified: 2025-04-07T14:18:34.453

Link: CVE-2025-2945

cve-icon Redhat

No data.