
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical remote code execution (RCE) vulnerability, tracked as CVE-2023-5002, was discovered in pgAdmin, affecting all versions prior to 7.7. The vulnerability exists in the pgAdmin server HTTP API that validates paths to external PostgreSQL utilities such as pg_dump and pg_restore. This issue was discovered and reported by Stefan Grönke (GitHub Issue, NVD).
The vulnerability stems from insufficient validation in the pgAdmin server HTTP API when validating paths to external PostgreSQL utilities. The API executes these utilities to determine their PostgreSQL version, but versions prior to 7.7 failed to properly control the server code execution. The vulnerability has received a CVSS v3.1 base score of 8.8 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
Successful exploitation of this vulnerability allows an authenticated user to execute arbitrary commands on the pgAdmin server. The attacker can achieve this by using commands as filenames and having the path validated through the API, effectively injecting commands into the path validator (SecurityOnline, GitHub Issue).
The primary mitigation is to upgrade to pgAdmin version 7.7 or later, which contains the fix for this vulnerability. For users who cannot immediately upgrade, it is recommended to implement strong security measures such as firewalls and intrusion detection systems, and to monitor the pgAdmin server environment for suspicious activity (SecurityOnline).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."