Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. pgadmin4
  4. ›
  5. CVE-2026-1707

CVE-2026-1707: pgadmin4 affected by a Restore restriction bypass via key disclosure vulnerability

February 5, 2026

pgAdmin versions 9.11 are affected by a Restore restriction bypass via key disclosure vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. An attacker with access to the pgAdmin web interface can observe an active restore operation, extract the \restrict key in real time, and race the restore process by overwriting the restore script with a payload that re-enables meta-commands using \unrestrict <key>. This results in reliable command execution on the pgAdmin host during the restore operation.

References

  • github.com/advisories/GHSA-3p7x-94q9-jq9x
  • github.com/pgadmin-org/pgadmin4
  • github.com/pgadmin-org/pgadmin4/commit/62e2d18b0261f88086db65059a6078db07169f18
  • github.com/pgadmin-org/pgadmin4/issues/9518
  • nvd.nist.gov/vuln/detail/CVE-2026-1707

Code Behaviors & Features

Detect and mitigate CVE-2026-1707 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 9.12

Fixed versions

  • 9.12

Solution

Upgrade to version 9.12 or above.

Impact 7.4 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-639: Authorization Bypass Through User-Controlled Key

Source file

pypi/pgadmin4/CVE-2026-1707.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 07 Feb 2026 00:18:04 +0000.