pgAdmin versions 9.11 are affected by a Restore restriction bypass via key disclosure vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. An attacker with access to the pgAdmin web interface can observe an active restore operation, extract the `\restrict` key in real time, and race the restore process by overwriting the restore script with a payload that re-enables meta-commands using `\unrestrict <key>`. This results in reliable command execution on the pgAdmin host during the restore operation.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/pgadmin-org/pgadmin4/issues/9518 |
|
History
Thu, 05 Feb 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pgAdmin versions 9.11 are affected by a Restore restriction bypass via key disclosure vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. An attacker with access to the pgAdmin web interface can observe an active restore operation, extract the `\restrict` key in real time, and race the restore process by overwriting the restore script with a payload that re-enables meta-commands using `\unrestrict <key>`. This results in reliable command execution on the pgAdmin host during the restore operation. | |
| Title | Restore restriction bypass via key disclosure vulnerability (pgAdmin 4) | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: PostgreSQL
Published:
Updated: 2026-02-05T20:46:56.383Z
Reserved: 2026-01-30T16:26:58.194Z
Link: CVE-2026-1707
No data.
Status : Received
Published: 2026-02-05T18:16:11.180
Modified: 2026-02-05T18:16:11.180
Link: CVE-2026-1707
No data.
OpenCVE Enrichment
No data.