CVE-2023-5002: pgAdmin failed to properly control the server code
6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.94729%
CWE
Published
9/22/2023
Updated
3/17/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pgadmin4 | pip | < 7.7 | 7.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper command execution patterns in two key functions:
- validate_binary_path directly executed user-controlled paths via subprocess.getoutput() using string formatting, making it susceptible to command injection.
- set_binary_path shared similar unsafe patterns before being patched. The commit diff shows both were modified to use subprocess.run() with explicit arguments lists and shell=False, indicating these were the injection vectors. The CWE-78 classification and patch's focus on command execution safety confirm these as vulnerable points.