pgAdmin 4 Path Traversal (CVE-2026-7819) Allows Arbitrary File Writes
The National Vulnerability Database (NVD) has detailed CVE-2026-7819, a high-severity symbolic-link path traversal vulnerability in pgAdmin 4’s File Manager. This flaw, rated 8.1 CVSS, allows an authenticated attacker to write to arbitrary paths on the server. The issue stems from an incomplete access check that used os.path.abspath, which correctly resolves .. (parent directory traversal) but fails to resolve symbolic links.
An attacker could plant a symbolic link within their own storage directory. This link, pointing outside the intended directory, would then be followed by the kernel during a subsequent write operation initiated by pgAdmin. This effectively allows the attacker to trick pgAdmin into writing to any path reachable by the pgAdmin process, bypassing security controls.
The fix, according to the NVD, involves switching the access check to os.path.realpath for both source and destination paths. Additionally, a new helper function, _open_upload_target, opens the target with O_NOFOLLOW and hardens the file mode from 0o644 to 0o600. This closes a critical Time-of-Check-Time-of-Use (TOCTOU) window between the access check and the actual file open operation. The vulnerability affects pgAdmin 4 versions prior to 9.15.
What This Means For You
- If your organization uses pgAdmin 4, you are exposed. This isn't just a data leak; it's arbitrary file write, which is a direct path to code execution and full system compromise. Patch immediately to version 9.15 or later. Audit your pgAdmin server for any suspicious file modifications or unexpected symlinks in user directories.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7819 | Path Traversal | pgAdmin 4 File Manager |
| CVE-2026-7819 | Path Traversal | pgAdmin 4 versions before 9.15 |
| CVE-2026-7819 | Path Traversal | CWE-61 |
| CVE-2026-7819 | Path Traversal | CWE-22 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 11, 2026 at 19:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.