pgadmin4 has a Meta-Command Filter Command Execution
Critical severity
GitHub Reviewed
Published
Dec 11, 2025
to the GitHub Advisory Database
•
Updated Dec 12, 2025
Description
Published by the National Vulnerability Database
Dec 11, 2025
Published to the GitHub Advisory Database
Dec 11, 2025
Reviewed
Dec 12, 2025
Last updated
Dec 12, 2025
The PLAIN restore meta-command filter introduced in pgAdmin as part of the fix for CVE-2025-12762 does not detect meta-commands when a SQL file begins with a UTF-8 Byte Order Mark (EF BB BF) or other special byte sequences. The implemented filter uses the function
has_meta_commands(), which scans raw bytes using a regular expression. The regex does not treat the bytes as ignorable, so meta-commands such as\\!remain undetected. When pgAdmin invokes psql with --file, psql strips the bytes and executes the command. This can result in remote command execution during a restore operation.References