pgadmin4 has a Meta-Command Filter Command Execution
Critical severity GitHub Reviewed Published Dec 11, 2025 to the GitHub Advisory Database • Updated Dec 12, 2025
Description
Published by the National Vulnerability DatabaseDec 11, 2025
Published to the GitHub Advisory Database Dec 11, 2025
Reviewed Dec 12, 2025
Last updated Dec 12, 2025
The PLAIN restore meta-command filter introduced in pgAdmin as part of the fix for CVE-2025-12762 does not detect meta-commands when a SQL file begins with a UTF-8 Byte Order Mark (EF BB BF) or other special byte sequences. The implemented filter uses the function
has_meta_commands(), which scans raw bytes using a regular expression. The regex does not treat the bytes as ignorable, so meta-commands such as\\!remain undetected. When pgAdmin invokes psql with --file, psql strips the bytes and executes the command. This can result in remote command execution during a restore operation.References