CVE-2023-5002

A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

History

17 Mar 2025, 16:43

Type Values Removed Values Added
CPE cpe:2.3:a:pgadmin:pgadmin:*:*:*:*:*:postgresql:*:* cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*
First Time Pgadmin pgadmin 4

Information

Published : 2023-09-22 14:15

Updated : 2025-03-17 16:43


NVD link : CVE-2023-5002

Mitre link : CVE-2023-5002

CVE.ORG link : CVE-2023-5002


JSON object : View

Products Affected

fedoraproject

  • fedora

pgadmin

  • pgadmin_4
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

NVD-CWE-noinfo