๐Ÿ” CVE Alert

CVE-2026-7815

HIGH 8.8

pgAdmin 4: SQL injection in Maintenance tool option values leading to remote code execution

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

SQL injection vulnerability in pgAdmin 4 Maintenance Tool. Four user-supplied JSON fields (buffer_usage_limit, vacuum_parallel, vacuum_index_cleanup, reindex_tablespace) were concatenated directly into the rendered VACUUM/ANALYZE/REINDEX command and passed to psql --command. An authenticated user with the tools_maintenance permission could break out of the option syntax and execute arbitrary SQL on the connected PostgreSQL server. The injected SQL could in turn invoke COPY ... TO PROGRAM to escalate to operating-system command execution on the database host. Fix introduces server-side allow-listing of all four fields and switches reindex_tablespace from manual quoting to the qtIdent filter. This issue affects pgAdmin 4: before 9.15.

Vendor pgadmin.org
Product pgadmin 4
Published May 11, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for pgadmin.org pgadmin 4

Be the first to know when new high vulnerabilities affecting pgadmin.org pgadmin 4 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

pgadmin.org / pgAdmin 4
7.6 < 9.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/pgadmin-org/pgadmin4/issues/9898

Credits

j3seer