{"id":"GHSA-rm79-x4g6-hvg5","summary":"pgAdmin 4 has command injection vulnerability on Windows systems","details":"pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providing specially crafted file path input.","aliases":["CVE-2025-12763"],"modified":"2025-11-13T23:27:50.678455Z","published":"2025-11-13T15:30:30Z","database_specific":{"cwe_ids":["CWE-78"],"github_reviewed_at":"2025-11-13T23:09:41Z","nvd_published_at":"2025-11-13T13:15:44Z","github_reviewed":true,"severity":"MODERATE"},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-12763"},{"type":"WEB","url":"https://github.com/pgadmin-org/pgadmin4/issues/9323"},{"type":"WEB","url":"https://github.com/pgadmin-org/pgadmin4/commit/e374edc69239b3e02ecde895e27d9f9e488b87ee"},{"type":"PACKAGE","url":"https://github.com/pgadmin-org/pgadmin4"}],"affected":[{"package":{"name":"pgadmin4","ecosystem":"PyPI","purl":"pkg:pypi/pgadmin4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.10"}]}],"versions":["4.20","4.22","4.23","4.24","4.25","4.26","4.27","4.28","4.29","4.30","5.0","5.1","5.2","5.3","5.4","5.5","5.6","5.7","6.10","6.11","6.12","6.13","6.14","6.15","6.16","6.17","6.18","6.19","6.2","6.20","6.21","6.3","6.4","6.5","6.6","6.7","6.8","6.9","7.0","7.1","7.2","7.3","7.4","7.5","7.6","7.7","7.8","8.0","8.1","8.10","8.11","8.12","8.13","8.14","8.2","8.3","8.4","8.5","8.6","8.7","8.8","8.9","9.0","9.1","9.2","9.3","9.4","9.5","9.6","9.7","9.8","9.9"],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-rm79-x4g6-hvg5/GHSA-rm79-x4g6-hvg5.json","last_known_affected_version_range":"\u003c= 9.9"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"}]}