CVE-2025-13780
December 11, 2025
pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.
Affected Packages
pgadmin4-python (CONDA):
Affected version(s) >=9.3 <9.11Fix Suggestion:
Update to version 9.11pgadmin4 (PYTHON):
Affected version(s) >=4.20 <9.11Fix Suggestion:
Update to version 9.11https://github.com/pgadmin-org/pgadmin4.git (SCM_GIT):
Affected version(s) >=REL-1_0-BETA1 <REL-9_11Fix Suggestion:
Update to version REL-9_11Related ResourcesĀ (6)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.5
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
LOW
Vulnerable System Availability
LOW
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
LOW
Subsequent System Availability
LOW
CVSS v3
Base Score:
9.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
LOW
Availability
LOW
Weakness Type (CWE)
EPSS
Base Score:
0.17