PgAdmin Vulnerability Allows Attackers to Gain Unauthorized Account Access

PgAdmin Vulnerability Allows Attackers to Gain Unauthorized Account Access

A newly disclosed security flaw in pgAdmin4, the widely used open-source tool for managing PostgreSQL databases, has raised serious concerns among developers and database administrators across the world.

The vulnerability, tracked as CVE-2025-9636, was recently highlighted in the GitHub Advisory Database and classified as High severity.

The issue lies in a Cross-Origin Opener Policy (COOP) vulnerability that affects versions of pgAdmin up to 9.7.

Attackers can exploit this flaw during the authentication and OAuth flow, potentially enabling unauthorized account access, session hijacking, and even full account takeover.

Such an exploit could compromise sensitive data, escalate user privileges, and facilitate further cyberattacks on connected systems.

Vulnerability Details

According to the advisory, the vulnerability requires some user interaction, but the risk remains significant due to the central role pgAdmin plays in managing PostgreSQL environments.

By manipulating the COOP headers, malicious actors can bypass normal browser protections, thereby tricking the authentication process into granting access to unauthorized users.

The consequences of successful exploitation could be wide-ranging. Administrators often use pgAdmin to perform critical tasks like database configuration, query management, and backup operations.

Field Details
CVE ID CVE-2025-9636
GitHub Advisory ID GHSA-6859-2qxq-ffv2
Severity High
Affected Versions pgAdmin ≤ 9.7
Patched Version 9.8
Vulnerability Type Cross-Origin Opener Policy (COOP) flaw

Unauthorized access could therefore lead to data theft, data corruption, or complete takeover of sensitive database infrastructure.

The CVSS v3.1 scoring indicates a severe impact on both confidentiality and integrity, reflecting the chance of leaked data and unauthorized modifications.

Although availability is only moderately affected, the disruption of trusted access and system reliability is a significant concern for organizations.

The pgAdmin development team has promptly addressed the problem. A patched version (9.8) has already been released to mitigate the risk.

Users and organizations relying on pgAdmin are strongly urged to upgrade immediately. Additionally, administrators should review current sessions, audit access logs, and consider rotating credentials in case unauthorized access has already occurred.

Security researchers emphasize that while the attack complexity is relatively high, organizations should not underestimate the potential of targeted or state-sponsored attackers who are capable of carrying out such exploits.

Maintaining an updated environment and monitoring log activity remain the best defenses against this class of vulnerabilities.

As more organizations migrate business-critical applications to PostgreSQL, the role of pgAdmin continues to grow.

This newly discovered vulnerability highlights the importance of staying updated with security patches and maintaining vigilance against authentication-related threats.

Organizations that fail to apply the fix risk exposing their systems to attackers capable of bypassing trust boundaries and gaining access to sensitive information.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.