Metrics
Affected Vendors & Products
| Link | Providers |
|---|---|
| https://github.com/pgadmin-org/pgadmin4/issues/9899 |
|
Mon, 11 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 |
Mon, 11 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 |
Mon, 11 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
ssvc
|
Mon, 11 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OS command injection (CWE-78) vulnerability in pgAdmin 4 Import/Export query export. User-supplied input was interpolated directly into a psql \copy metacommand template without sanitization. An authenticated user could inject ") TO PROGRAM 'cmd'" to break out of the \copy (...) context and achieve arbitrary command execution on the pgAdmin server, or ") TO '/path'" for arbitrary file write. Additional fields (format, on_error, log_verbosity) were also raw-interpolated and exploitable. Fix adds a parens-balance parser modeled on psql's strtokx tokenizer, allow-lists format/on_error/log_verbosity, rejects null bytes in the query, and tightens type and gating checks. This issue affects pgAdmin 4: before 9.15. | |
| Title | pgAdmin 4: OS command injection in Import/Export query export via psql metacommand breakout | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: PostgreSQL
Published:
Updated: 2026-05-11T16:08:46.148Z
Reserved: 2026-05-04T21:26:58.164Z
Link: CVE-2026-7816
Updated: 2026-05-11T16:08:42.394Z
Status : Received
Published: 2026-05-11T16:17:38.260
Modified: 2026-05-11T17:16:35.000
Link: CVE-2026-7816
No data.
OpenCVE Enrichment
Updated: 2026-05-11T20:45:26Z