CVE-2023-5002

moderate-risk
Published 2023-09-22

A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.

Do I need to act?

!
25.3% chance of exploitation in next 30 days
EPSS score — higher than 75% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.0/10 Medium
NETWORK / HIGH complexity

Affected Products (3)

Affected Vendors

43
/ 100
moderate-risk
Severity 19/34 · Moderate
Exploitability 15/34 · Moderate
Exposure 9/34 · Low