
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-12763 affects pgAdmin 4 versions up to 9.9, exposing a command injection vulnerability specifically on Windows systems. The vulnerability was disclosed on November 13, 2025, and stems from the use of shell=True parameter during backup and restore operations (GitHub Advisory, NVD).
The vulnerability exists due to the improper implementation of subprocess.Popen calls within the execute function of the process_executor.py module, specifically using shell=True parameter during backup and restore operations. This implementation allows attackers to execute arbitrary system commands by providing specially crafted file path input. The vulnerability has been assigned a CVSS v3.1 score of 6.8 with the vector CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H (Miggo).
When successfully exploited, this vulnerability enables attackers to execute arbitrary system commands on affected Windows systems through specially crafted file path inputs during backup and restore operations. This could lead to complete system compromise with the same privileges as the pgAdmin application (Miggo).
The vulnerability is addressed by setting shell=False for all operating systems, which neutralizes the command injection vector. Users should upgrade to versions after 9.9 once available (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."