pgAdmin PostgreSQL pgAdmin pgAdmin is an administration tool for PostgreSQL databases

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in PostgreSQL pgAdmin.

By the Year

In 2025 there have been 0 vulnerabilities in PostgreSQL pgAdmin. pgAdmin did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2025 0 0.00
2024 0 0.00
2023 1 6.50
2022 2 7.65
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new pgAdmin vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent PostgreSQL pgAdmin Security Vulnerabilities

pgAdmin 4 versions prior to v6.19 contains a directory traversal vulnerability

CVE-2023-0241 6.5 - Medium - March 27, 2023

pgAdmin 4 versions prior to v6.19 contains a directory traversal vulnerability. A user of the product may change another user's settings or alter the database.

Directory traversal

The pgAdmin server includes an HTTP API

CVE-2022-4223 8.8 - High - December 13, 2022

The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server.

AuthZ

A malicious, but authorised and authenticated user can construct an HTTP request using their existing CSRF token and session cookie to manually upload files to any location

CVE-2022-0959 6.5 - Medium - March 16, 2022

A malicious, but authorised and authenticated user can construct an HTTP request using their existing CSRF token and session cookie to manually upload files to any location that the operating system user account under which pgAdmin is running has permission to write.

Directory traversal

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for PostgreSQL pgAdmin or by PostgreSQL? Click the Watch button to subscribe.

PostgreSQL
Vendor

PostgreSQL pgAdmin
pgAdmin is an administration tool for PostgreSQL databases

subscribe