HomePgadminCVE-2022-4223

CVE-2022-4223

HIGH
8.8CVSS
Published: 2022-12-13
Updated: 2025-04-14
AI Analysis

Description

The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-94CWE-862

Metadata

Primary Vendor
PGADMIN
Published
12/13/2022
Last Modified
4/14/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

pgadmin : pgadmin_4fedoraproject : fedora

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2022-4223 | HIGH Severity | CVEDatabase.com | CVEDatabase.com