CVE-2026-7818: pgAdmin 4 Deserialization Flaw Allows RCE
The National Vulnerability Database has detailed CVE-2026-7818, a high-severity deserialization vulnerability (CWE-502) in pgAdmin 4’s FileBackedSessionManager. This flaw allowed unsafe deserialization of session file contents, leveraging Python’s standard object-serialization module, before any HMAC integrity check. Essentially, any file dropped into the sessions directory was unconditionally deserialized.
An authenticated user with write access to the sessions directory—either through misconfiguration or in conjunction with another path traversal vulnerability—could plant a specially crafted serialized payload. This would lead to operating-system level remote code execution under the pgAdmin process identity. The National Vulnerability Database states this issue affects pgAdmin 4 versions prior to 9.15.
The fix involves prepending a 64-byte hex SHA-256 HMAC over the session body, computed with SECRET_KEY, and verifying it via hmac.compare_digest before any deserialization. This critical integrity check is now enforced, even raising an error if SECRET_KEY is empty, preventing attackers from bypassing it. This is a classic example of what happens when integrity checks come too late in the processing chain.
What This Means For You
- If your organization uses pgAdmin 4, you need to check your version immediately. This isn't theoretical: an authenticated attacker with a foothold can elevate privileges to RCE. Patch pgAdmin 4 to version 9.15 or later RIGHT NOW to remediate CVE-2026-7818. Also, audit your session directory permissions for any excessive write access.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7818 | RCE | pgAdmin 4: before 9.15 |
| CVE-2026-7818 | Deserialization | CWE-502 |
| CVE-2026-7818 | Deserialization | pgAdmin 4 FileBackedSessionManager |
| CVE-2026-7818 | RCE | Unsafe deserialization of session-file contents in sessions directory |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 11, 2026 at 19:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.