-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The core vulnerability stemmed from multiple implementations of filename_with_file_manager_path across different modules that handled user-supplied file paths without: 1. Proper path normalization 2. User-specific directory isolation checks 3. Prevention of relative path traversal. The commit diff shows these functions were removed and replaced with a centralized implementation in utils/init.py that adds Filemanager.check_access_permission validation. The original functions allowed authenticated users to bypass directory restrictions using '../' sequences, as demonstrated in the reproduction steps from GHSA-9crj-hpxh-f6qg.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pgadmin4 | pip | <= 6.18 | 6.19 |
KEV Misses 88% of Exploited CVEs- Get the report