CVE-2025-2945
CRITICALpgAdmin Query Tool authenticated RCE (CVE-2025-2945)
Title source: metasploitDescription
Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules). The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution. This issue affects pgAdmin 4: before 9.2.
Exploits (6)
nomisec
WORKING POC
3 stars
by abrewer251 · poc
https://github.com/abrewer251/CVE-2025-2945_PgAdmin_PoC
nomisec
WORKING POC
2 stars
by ExtremeUday · poc
https://github.com/ExtremeUday/CVE-2025-2945-pgAdmin4-Authenticated-RCE-PoC-
github
WORKING POC
by manus-use · postscriptpoc
https://github.com/manus-use/cve-pocs/tree/main/pgadmin4-CVE-2025-2945
metasploit
WORKING POC
EXCELLENT
by pyozzi-toss, jheysel-r7 · rubypocpython
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/pgadmin_query_tool_authenticated.rb
Scores
CVSS v3
9.9
EPSS
0.7790
EPSS Percentile
99.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Classification
CWE
CWE-94
Status
published
Affected Products (2)
pgadmin/pgadmin_4
< 9.2
pypi/pgadmin4
< 9.2PyPI
Timeline
Published
Apr 03, 2025
Tracked Since
Feb 18, 2026