pgAdmin <= 8.5 is affected by XSS vulnerability in /settings/store API response json payload. This vulnerability allows attackers to execute malicious script at the client end.
References
Link | Resource |
---|---|
https://github.com/pgadmin-org/pgadmin4/issues/7282 | Exploit Issue Tracking Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2YFVCB4HCXU3FQBZ5XTWJZWSZUDNCXE/ | Mailing List |
https://github.com/pgadmin-org/pgadmin4/issues/7282 | Exploit Issue Tracking Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2YFVCB4HCXU3FQBZ5XTWJZWSZUDNCXE/ | Mailing List |
Configurations
History
19 Sep 2025, 13:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* |
|
References | () https://github.com/pgadmin-org/pgadmin4/issues/7282 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2YFVCB4HCXU3FQBZ5XTWJZWSZUDNCXE/ - Mailing List | |
First Time |
Fedoraproject
Pgadmin Fedoraproject fedora Pgadmin pgadmin 4 |
13 Feb 2025, 18:18
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) pgAdmin <= 8.5 is affected by XSS vulnerability in /settings/store API response json payload. This vulnerability allows attackers to execute malicious script at the client end. |
Information
Published : 2024-05-02 18:15
Updated : 2025-09-19 13:27
NVD link : CVE-2024-4216
Mitre link : CVE-2024-4216
CVE.ORG link : CVE-2024-4216
JSON object : View
Products Affected
pgadmin
- pgadmin_4
fedoraproject
- fedora
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')