Vulnerability Description
Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules). The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution. This issue affects pgAdmin 4: before 9.2.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pgadmin | Pgadmin 4 | < 9.2 |
Related Weaknesses (CWE)
References
- https://github.com/pgadmin-org/pgadmin4/issues/8603ExploitIssue Tracking
FAQ
What is CVE-2025-2945?
CVE-2025-2945 is a vulnerability with a CVSS score of 9.9 (CRITICAL). Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules). The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where ...
How severe is CVE-2025-2945?
CVE-2025-2945 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-2945?
Check the references section above for vendor advisories and patch information. Affected products include: Pgadmin Pgadmin 4.