pgAdmin <= 8.5 is affected by XSS vulnerability in /settings/store API response json payload. This vulnerability allows attackers to execute malicious script at the client end.
References
| Link | Resource |
|---|---|
| https://github.com/pgadmin-org/pgadmin4/issues/7282 | Exploit Issue Tracking Vendor Advisory |
| https://lists.fedoraproject.org/archives/list/[email protected]/message/T2YFVCB4HCXU3FQBZ5XTWJZWSZUDNCXE/ | Mailing List |
| https://github.com/pgadmin-org/pgadmin4/issues/7282 | Exploit Issue Tracking Vendor Advisory |
| https://lists.fedoraproject.org/archives/list/[email protected]/message/T2YFVCB4HCXU3FQBZ5XTWJZWSZUDNCXE/ | Mailing List |
Configurations
History
No history.
Information
Published : 2024-05-02 18:15
Updated : 2025-09-19 13:27
NVD link : CVE-2024-4216
Mitre link : CVE-2024-4216
CVE.ORG link : CVE-2024-4216
JSON object : View
Products Affected
fedoraproject
- fedora
pgadmin
- pgadmin_4
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
