Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-2946 (GCVE-0-2025-2946)
Vulnerability from cvelistv5 – Published: 2025-04-03 12:23 – Updated: 2025-04-03 17:57
VLAI?
EPSS
Title
Cross-Site Vulnerability(XSS) due to arbitrary HTML/JavaScript gets executed while query result rendering in Query Tool and View/Edit Data Tool of pgAdmin 4
Summary
pgAdmin <= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers execute any arbitrary HTML/JavaScript in a user's browser through query result rendering, then HTML/JavaScript runs on the browser.
Severity ?
9.1 (Critical)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://github.com/pgadmin-org/pgadmin4/issues/8602 | issue-tracking |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| pgadmin.org | pgAdmin 4 |
Affected:
0 , < 9.2
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-2946",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-03T13:13:37.371829Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-03T17:57:18.517Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"modules": [
"Query Tool",
"View/Edit Data Tool"
],
"product": "pgAdmin 4",
"programFiles": [
"https://github.com/pgadmin-org/pgadmin4/blob/master/web/pgadmin/static/js/utils.js"
],
"repo": "https://github.com/pgadmin-org/pgadmin4",
"vendor": "pgadmin.org",
"versions": [
{
"lessThan": "9.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "pgAdmin \u0026lt;= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eexecute any arbitrary HTML/JavaScript in a user\u0027s browser through query result rendering, then HTML/JavaScript runs on the browser.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "pgAdmin \u003c= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers\u00a0execute any arbitrary HTML/JavaScript in a user\u0027s browser through query result rendering, then HTML/JavaScript runs on the browser."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-03T12:23:30.694Z",
"orgId": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"shortName": "PostgreSQL"
},
"references": [
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/pgadmin-org/pgadmin4/issues/8602"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Cross-Site Vulnerability(XSS) due to arbitrary HTML/JavaScript gets executed while query result rendering in Query Tool and View/Edit Data Tool of pgAdmin 4",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"assignerShortName": "PostgreSQL",
"cveId": "CVE-2025-2946",
"datePublished": "2025-04-03T12:23:30.694Z",
"dateReserved": "2025-03-29T01:38:36.107Z",
"dateUpdated": "2025-04-03T17:57:18.517Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-2946",
"date": "2026-05-18",
"epss": "0.00113",
"percentile": "0.29426"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-2946\",\"sourceIdentifier\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"published\":\"2025-04-03T13:15:43.377\",\"lastModified\":\"2025-04-23T22:24:39.353\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"pgAdmin \u003c= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers\u00a0execute any arbitrary HTML/JavaScript in a user\u0027s browser through query result rendering, then HTML/JavaScript runs on the browser.\"},{\"lang\":\"es\",\"value\":\"pgAdmin \u0026lt;= 9.1 se ve afectado por una vulnerabilidad de seguridad relacionada con Cross-Site Scripting (XSS). Si los atacantes ejecutan cualquier c\u00f3digo HTML/JavaScript arbitrario en el navegador de un usuario mediante la representaci\u00f3n de resultados de una consulta, dicho c\u00f3digo se ejecutar\u00e1 en el navegador.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":5.3},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*\",\"versionEndIncluding\":\"9.1\",\"matchCriteriaId\":\"40EE4FBA-423E-4FF3-87A0-91358DA2F0D7\"}]}]}],\"references\":[{\"url\":\"https://github.com/pgadmin-org/pgadmin4/issues/8602\",\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"tags\":[\"Issue Tracking\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-2946\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-03T13:13:37.371829Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-03T13:13:53.276Z\"}}], \"cna\": {\"title\": \"Cross-Site Vulnerability(XSS) due to arbitrary HTML/JavaScript gets executed while query result rendering in Query Tool and View/Edit Data Tool of pgAdmin 4\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/pgadmin-org/pgadmin4\", \"vendor\": \"pgadmin.org\", \"modules\": [\"Query Tool\", \"View/Edit Data Tool\"], \"product\": \"pgAdmin 4\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"9.2\", \"versionType\": \"custom\"}], \"programFiles\": [\"https://github.com/pgadmin-org/pgadmin4/blob/master/web/pgadmin/static/js/utils.js\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://github.com/pgadmin-org/pgadmin4/issues/8602\", \"tags\": [\"issue-tracking\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"pgAdmin \u003c= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers\\u00a0execute any arbitrary HTML/JavaScript in a user\u0027s browser through query result rendering, then HTML/JavaScript runs on the browser.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"pgAdmin \u0026lt;= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers\u0026nbsp;\u003cspan style=\\\"background-color: var(--wht);\\\"\u003eexecute any arbitrary HTML/JavaScript in a user\u0027s browser through query result rendering, then HTML/JavaScript runs on the browser.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"shortName\": \"PostgreSQL\", \"dateUpdated\": \"2025-04-03T12:23:30.694Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-2946\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-03T17:57:18.517Z\", \"dateReserved\": \"2025-03-29T01:38:36.107Z\", \"assignerOrgId\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"datePublished\": \"2025-04-03T12:23:30.694Z\", \"assignerShortName\": \"PostgreSQL\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2025-2946
Vulnerability from fkie_nvd - Published: 2025-04-03 13:15 - Updated: 2025-04-23 22:24
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
pgAdmin <= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers execute any arbitrary HTML/JavaScript in a user's browser through query result rendering, then HTML/JavaScript runs on the browser.
References
| URL | Tags | ||
|---|---|---|---|
| f86ef6dc-4d3a-42ad-8f28-e6d5547a5007 | https://github.com/pgadmin-org/pgadmin4/issues/8602 | Issue Tracking |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*",
"matchCriteriaId": "40EE4FBA-423E-4FF3-87A0-91358DA2F0D7",
"versionEndIncluding": "9.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "pgAdmin \u003c= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers\u00a0execute any arbitrary HTML/JavaScript in a user\u0027s browser through query result rendering, then HTML/JavaScript runs on the browser."
},
{
"lang": "es",
"value": "pgAdmin \u0026lt;= 9.1 se ve afectado por una vulnerabilidad de seguridad relacionada con Cross-Site Scripting (XSS). Si los atacantes ejecutan cualquier c\u00f3digo HTML/JavaScript arbitrario en el navegador de un usuario mediante la representaci\u00f3n de resultados de una consulta, dicho c\u00f3digo se ejecutar\u00e1 en el navegador."
}
],
"id": "CVE-2025-2946",
"lastModified": "2025-04-23T22:24:39.353",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 5.3,
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-04-03T13:15:43.377",
"references": [
{
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/pgadmin-org/pgadmin4/issues/8602"
}
],
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
OPENSUSE-SU-2025:14983-1
Vulnerability from csaf_opensuse - Published: 2025-04-10 00:00 - Updated: 2025-04-10 00:00Summary
pgadmin4-9.2-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: pgadmin4-9.2-1.1 on GA media
Description of the patch: These are all security issues fixed in the pgadmin4-9.2-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2025-14983
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
9.9 (Critical)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
9.1 (Critical)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
References
16 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "pgadmin4-9.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the pgadmin4-9.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14983",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14983-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14983-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYON52PV4P44MGBG55FDOG2SP2G266ZO/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14983-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYON52PV4P44MGBG55FDOG2SP2G266ZO/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6238 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-9014 page",
"url": "https://www.suse.com/security/cve/CVE-2024-9014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2945 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2946 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2946/"
}
],
"title": "pgadmin4-9.2-1.1 on GA media",
"tracking": {
"current_release_date": "2025-04-10T00:00:00Z",
"generator": {
"date": "2025-04-10T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14983-1",
"initial_release_date": "2025-04-10T00:00:00Z",
"revision_history": [
{
"date": "2025-04-10T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.2-1.1.aarch64",
"product": {
"name": "pgadmin4-9.2-1.1.aarch64",
"product_id": "pgadmin4-9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.2-1.1.aarch64",
"product": {
"name": "pgadmin4-cloud-9.2-1.1.aarch64",
"product_id": "pgadmin4-cloud-9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.2-1.1.aarch64",
"product": {
"name": "pgadmin4-desktop-9.2-1.1.aarch64",
"product_id": "pgadmin4-desktop-9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.2-1.1.aarch64",
"product": {
"name": "pgadmin4-doc-9.2-1.1.aarch64",
"product_id": "pgadmin4-doc-9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"product": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"product_id": "pgadmin4-web-uwsgi-9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.2-1.1.aarch64",
"product": {
"name": "system-user-pgadmin-9.2-1.1.aarch64",
"product_id": "system-user-pgadmin-9.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.2-1.1.ppc64le",
"product": {
"name": "pgadmin4-9.2-1.1.ppc64le",
"product_id": "pgadmin4-9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.2-1.1.ppc64le",
"product": {
"name": "pgadmin4-cloud-9.2-1.1.ppc64le",
"product_id": "pgadmin4-cloud-9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.2-1.1.ppc64le",
"product": {
"name": "pgadmin4-desktop-9.2-1.1.ppc64le",
"product_id": "pgadmin4-desktop-9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.2-1.1.ppc64le",
"product": {
"name": "pgadmin4-doc-9.2-1.1.ppc64le",
"product_id": "pgadmin4-doc-9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"product": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"product_id": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.2-1.1.ppc64le",
"product": {
"name": "system-user-pgadmin-9.2-1.1.ppc64le",
"product_id": "system-user-pgadmin-9.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.2-1.1.s390x",
"product": {
"name": "pgadmin4-9.2-1.1.s390x",
"product_id": "pgadmin4-9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.2-1.1.s390x",
"product": {
"name": "pgadmin4-cloud-9.2-1.1.s390x",
"product_id": "pgadmin4-cloud-9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.2-1.1.s390x",
"product": {
"name": "pgadmin4-desktop-9.2-1.1.s390x",
"product_id": "pgadmin4-desktop-9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.2-1.1.s390x",
"product": {
"name": "pgadmin4-doc-9.2-1.1.s390x",
"product_id": "pgadmin4-doc-9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.2-1.1.s390x",
"product": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.s390x",
"product_id": "pgadmin4-web-uwsgi-9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.2-1.1.s390x",
"product": {
"name": "system-user-pgadmin-9.2-1.1.s390x",
"product_id": "system-user-pgadmin-9.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.2-1.1.x86_64",
"product": {
"name": "pgadmin4-9.2-1.1.x86_64",
"product_id": "pgadmin4-9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.2-1.1.x86_64",
"product": {
"name": "pgadmin4-cloud-9.2-1.1.x86_64",
"product_id": "pgadmin4-cloud-9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.2-1.1.x86_64",
"product": {
"name": "pgadmin4-desktop-9.2-1.1.x86_64",
"product_id": "pgadmin4-desktop-9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.2-1.1.x86_64",
"product": {
"name": "pgadmin4-doc-9.2-1.1.x86_64",
"product_id": "pgadmin4-doc-9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"product": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"product_id": "pgadmin4-web-uwsgi-9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.2-1.1.x86_64",
"product": {
"name": "system-user-pgadmin-9.2-1.1.x86_64",
"product_id": "system-user-pgadmin-9.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64"
},
"product_reference": "pgadmin4-9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le"
},
"product_reference": "pgadmin4-9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x"
},
"product_reference": "pgadmin4-9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64"
},
"product_reference": "pgadmin4-9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64"
},
"product_reference": "pgadmin4-cloud-9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le"
},
"product_reference": "pgadmin4-cloud-9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x"
},
"product_reference": "pgadmin4-cloud-9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64"
},
"product_reference": "pgadmin4-cloud-9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64"
},
"product_reference": "pgadmin4-desktop-9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le"
},
"product_reference": "pgadmin4-desktop-9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x"
},
"product_reference": "pgadmin4-desktop-9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64"
},
"product_reference": "pgadmin4-desktop-9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64"
},
"product_reference": "pgadmin4-doc-9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le"
},
"product_reference": "pgadmin4-doc-9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x"
},
"product_reference": "pgadmin4-doc-9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64"
},
"product_reference": "pgadmin4-doc-9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64"
},
"product_reference": "pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le"
},
"product_reference": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x"
},
"product_reference": "pgadmin4-web-uwsgi-9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64"
},
"product_reference": "pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64"
},
"product_reference": "system-user-pgadmin-9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le"
},
"product_reference": "system-user-pgadmin-9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x"
},
"product_reference": "system-user-pgadmin-9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
},
"product_reference": "system-user-pgadmin-9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6238"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin \u003c= 8.8 has an installation Directory permission issue. Because of this issue, attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6238",
"url": "https://www.suse.com/security/cve/CVE-2024-6238"
},
{
"category": "external",
"summary": "SUSE Bug 1227080 for CVE-2024-6238",
"url": "https://bugzilla.suse.com/1227080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-10T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-6238"
},
{
"cve": "CVE-2024-9014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-9014"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-9014",
"url": "https://www.suse.com/security/cve/CVE-2024-9014"
},
{
"category": "external",
"summary": "SUSE Bug 1230928 for CVE-2024-9014",
"url": "https://bugzilla.suse.com/1230928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-10T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-9014"
},
{
"cve": "CVE-2025-2945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2945"
}
],
"notes": [
{
"category": "general",
"text": "Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules).\n\nThe vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution.\n\n\nThis issue affects pgAdmin 4: before 9.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2945",
"url": "https://www.suse.com/security/cve/CVE-2025-2945"
},
{
"category": "external",
"summary": "SUSE Bug 1240746 for CVE-2025-2945",
"url": "https://bugzilla.suse.com/1240746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-10T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-2945"
},
{
"cve": "CVE-2025-2946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2946"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin \u003c= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers execute any arbitrary HTML/JavaScript in a user\u0027s browser through query result rendering, then HTML/JavaScript runs on the browser.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2946",
"url": "https://www.suse.com/security/cve/CVE-2025-2946"
},
{
"category": "external",
"summary": "SUSE Bug 1240748 for CVE-2025-2946",
"url": "https://bugzilla.suse.com/1240748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-10T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-2946"
}
]
}
WID-SEC-W-2025-0708
Vulnerability from csaf_certbund - Published: 2025-04-03 22:00 - Updated: 2025-11-11 23:00Summary
pgAdmin: Mehrere Schwachstellen
Severity
Kritisch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: pgAdmin ist eine Verwaltungs- und Entwicklungsplattform für die PostgreSQL-Datenbank.
Angriff: Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in pgAdmin ausnutzen, um beliebigen Programmcode, oder Cross-Site Scripting auszuführen.
Betroffene Betriebssysteme: - Linux
- Sonstiges
- UNIX
- Windows
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source pgAdmin <v9.2
Open Source / pgAdmin
|
<v9.2 | ||
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source pgAdmin <v9.2
Open Source / pgAdmin
|
<v9.2 | ||
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
References
8 references
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "pgAdmin ist eine Verwaltungs- und Entwicklungsplattform f\u00fcr die PostgreSQL-Datenbank.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in pgAdmin ausnutzen, um beliebigen Programmcode, oder Cross-Site Scripting auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0708 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0708.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0708 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0708"
},
{
"category": "external",
"summary": "pgAdmin Release Notes vom 2025-04-03",
"url": "http://www.pgadmin.org/news/#109"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2025-04-03",
"url": "https://github.com/advisories/GHSA-g73c-fw68-pwx3"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2025-04-03",
"url": "https://github.com/advisories/GHSA-2rrx-pphc-qfv9"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14983-1 vom 2025-04-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BYON52PV4P44MGBG55FDOG2SP2G266ZO/"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-49D6F62C0E vom 2025-04-17",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-49d6f62c0e"
},
{
"category": "external",
"summary": "pgAdminOpendoor Exploit (CVE-2025-2945) vom 2025-11-11",
"url": "https://github.com/I3r1h0n/pgAdminOpendoor/tree/main"
}
],
"source_lang": "en-US",
"title": "pgAdmin: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-11T23:00:00.000+00:00",
"generator": {
"date": "2025-11-11T19:02:21.916+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-0708",
"initial_release_date": "2025-04-03T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-04-21T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "4",
"summary": "Exploit f\u00fcr CVE-2025-2945 aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cv9.2",
"product": {
"name": "Open Source pgAdmin \u003cv9.2",
"product_id": "T042388"
}
},
{
"category": "product_version",
"name": "v9.2",
"product": {
"name": "Open Source pgAdmin v9.2",
"product_id": "T042388-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:pgadmin:pgadmin:v9.2"
}
}
}
],
"category": "product_name",
"name": "pgAdmin"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-2945",
"product_status": {
"known_affected": [
"T042388",
"T027843",
"74185"
]
},
"release_date": "2025-04-03T22:00:00.000+00:00",
"title": "CVE-2025-2945"
},
{
"cve": "CVE-2025-2946",
"product_status": {
"known_affected": [
"T042388",
"T027843",
"74185"
]
},
"release_date": "2025-04-03T22:00:00.000+00:00",
"title": "CVE-2025-2946"
}
]
}
GHSA-2RRX-PPHC-QFV9
Vulnerability from github – Published: 2025-04-03 15:31 – Updated: 2025-04-04 14:23
VLAI?
Summary
pgAdmin 4 Vulnerable to Cross-Site Scripting (XSS) via Query Result Rendering
Details
pgAdmin <= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers execute any arbitrary HTML/JavaScript in a user's browser through query result rendering, then HTML/JavaScript runs on the browser.
Severity ?
9.1 (Critical)
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "pgadmin4"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "9.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-2946"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2025-04-04T14:23:53Z",
"nvd_published_at": "2025-04-03T13:15:43Z",
"severity": "CRITICAL"
},
"details": "pgAdmin \u003c= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers\u00a0execute any arbitrary HTML/JavaScript in a user\u0027s browser through query result rendering, then HTML/JavaScript runs on the browser.",
"id": "GHSA-2rrx-pphc-qfv9",
"modified": "2025-04-04T14:23:54Z",
"published": "2025-04-03T15:31:13Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2946"
},
{
"type": "WEB",
"url": "https://github.com/pgadmin-org/pgadmin4/issues/8602"
},
{
"type": "WEB",
"url": "https://github.com/pgadmin-org/pgadmin4/commit/1305d9910beefd0d6b4c7eb4f111f86edb1d356b"
},
{
"type": "PACKAGE",
"url": "https://github.com/pgadmin-org/pgadmin4"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
"type": "CVSS_V3"
}
],
"summary": "pgAdmin 4 Vulnerable to Cross-Site Scripting (XSS) via Query Result Rendering"
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…