HomePgadminCVE-2023-5002

CVE-2023-5002

MEDIUM
6.0CVSS
Published: 2023-09-22
Updated: 2025-03-17
AI Analysis

Description

A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
Attack Vector
network
Complexity
high
Privileges
high
User Action
required
Scope
unchanged
Confidentiality
low
Integrity
high
Availability
high
Weaknesses
CWE-78NVD-CWE-noinfo

Metadata

Primary Vendor
PGADMIN
Published
9/22/2023
Last Modified
3/17/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

pgadmin : pgadmin_4fedoraproject : fedorafedoraproject : fedora

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2023-5002 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com