December 4 Advisory: pgAdmin4 Allows RCE via PLAIN-Format Dump File Restore [CVE-2025-12762]

Rapid Response

Vulnerability Description 

CVE-2025-12762 is a critical remote code execution (RCE) vulnerability in pgAdmin4 server mode when restoring PLAIN-format dump files allows an attacker to inject and execute arbitrary commands on the host. Exploitation of this flaw has the potential to cause full system compromise of the pgAdmin host and downstream database environment, including database management systems and underlying data integrity.

Screenshot-2025-12-05-at-10.34.24-AM.png
Map of potentially affected hosts

See the full breakdown by country in Censys Platform –> 

FieldDescription
CVE-IDCVE-2025-12762 — CVSS 9.8 — assigned by PostgreSQL 
Vulnerability DescriptionA remote code execution (RCE) vulnerability in pgAdmin4 server mode when restoring PLAIN-format dump files allows an attacker to inject and execute arbitrary commands on the host.Risk impact is database management systems and underlying data integrity.Full system compromise of pgAdmin host and downstream database environment is possible through this flaw.
Date of DisclosureNovember 13, 2025 
Affected AssetspgAdmin4 server
Vulnerable Software VersionspgAdmin4 server mode version 9.9 or earlier.Requires the dump restore functionality using PLAIN-format files.
PoC Available?No public PoC is currently available.
Exploitation StatusNo known exploitation at this time
Patch StatusUpgrade to pgAdmin4 version 9.10 (or later)

Censys Perspective

At the time of writing, Censys observes 7,393 instances of potentially exposed hosts, trackable with the following queries:

Platform:

host.services.software: (product: "pgadmin_4" and version<"9.10") and not host.services.labels.value: "HONEYPOT"

ASM:

risks.name: "Vulnerable pgAdmin 4 [CVE-2025-12762]"

Legacy Search:

services.software: (product: "pgAdmin 4" and version: {* to 9.10.0}) and not labels: {honeypot, tarpit}

References

Subscribe to our blog