pgadmin4 affected by a Restore restriction bypass via key disclosure vulnerability
High severity
GitHub Reviewed
Published
Feb 5, 2026
to the GitHub Advisory Database
•
Updated Feb 5, 2026
Description
Published by the National Vulnerability Database
Feb 5, 2026
Published to the GitHub Advisory Database
Feb 5, 2026
Last updated
Feb 5, 2026
Reviewed
Feb 5, 2026
pgAdmin versions 9.11 are affected by a Restore restriction bypass via key disclosure vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. An attacker with access to the pgAdmin web interface can observe an active restore operation, extract the
\restrictkey in real time, and race the restore process by overwriting the restore script with a payload that re-enables meta-commands using\unrestrict <key>. This results in reliable command execution on the pgAdmin host during the restore operation.References