Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2025-2945Code Injection in Pgadmin 4

CWE-94Code Injection7 documents6 sources
Severity
8.8HIGHNVD
CNA9.9
EPSS
77.9%
top 0.99%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 3
Latest updateApr 8

Description

Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules). The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution. This issue affects pgAdmin 4: before 9.2.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5pgadmin.org/pgadmin_4< 9.2

🔴Vulnerability Details

3
GHSA
pgAdmin 4 Vulnerable to Remote Code Execution2025-04-03
CVEList
pgAdmin 4: Remote Code Execution in Query Tool and Cloud Deployment2025-04-03
OSV
pgAdmin 4 Vulnerable to Remote Code Execution2025-04-03

💥Exploits & PoCs

1
Metasploit
pgAdmin Query Tool authenticated RCE (CVE-2025-2945)

🔍Detection Rules

2
Suricata
ET WEB_SPECIFIC_APPS PostgreSQL pgAdmin4 Authenticated Remote Code Execution (CVE-2025-2945) M12025-04-08
Suricata
ET WEB_SPECIFIC_APPS PostgreSQL pgAdmin4 Authenticated Remote Code Execution (CVE-2025-2945) M22025-04-08
CVE-2025-2945 — Code Injection in Pgadmin.org Pgadmin 4 | cvebase