CVE-2023-5002
moderate-risk
Published 2023-09-22
A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.
Do I need to act?
!
25.3% chance of exploitation in next 30 days
EPSS score — higher than 75% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.0/10
Medium
NETWORK
/ HIGH complexity
Affected Vendors
References (8)
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2239164
Issue Tracking
https://github.com/pgadmin-org/pgadmin4/issues/6763
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2239164
Issue Tracking
https://github.com/pgadmin-org/pgadmin4/issues/6763
43
/ 100
moderate-risk
Severity
19/34 · Moderate
Exploitability
15/34 · Moderate
Exposure
9/34 · Low