
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-12763 affects pgAdmin 4 versions up to 9.9, exposing a command injection vulnerability specifically on Windows systems. The vulnerability was disclosed on November 13, 2025, and stems from the use of shell=True during backup and restore operations (NVD).
The vulnerability is caused by the improper implementation of backup and restore operations in pgAdmin 4, where the use of shell=True during process creation enables attackers to execute arbitrary system commands through specially crafted file path inputs. The CVSS v3.1 score is 6.8 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H, indicating network accessibility with high privileges required (NVD).
If successfully exploited, this vulnerability allows attackers to execute arbitrary system commands on affected Windows systems running pgAdmin 4, potentially leading to system compromise with the privileges of the pgAdmin application (NVD).
The issue has been identified and tracked for resolution in the upcoming version 9.10 of pgAdmin 4. Users are advised to upgrade to version 9.10 or later when available, or implement strict access controls to the pgAdmin interface in the meantime (PostgreSQL Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."