Exploit for CVE-2025-2945

Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules).

The vulnerability is associated with the 2 POST endpoints, /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution.


This issue affects pgAdmin 4: before 9.2.

Published: 2025-04-03

CVSS: 9.9

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Download Exploit for CVE-2025-2945 here:

Use Tor Browser to access .onion links.

Check our team here:

https://tatramed.sk/exploit-980-cve-2024-0056/

https://tatramed.sk/exploit-572-cve-2023-28434/

https://tatramed.sk/exploit-564-cve-2024-8069/

https://tatramed.sk/exploit-281-cve-2025-55227/

https://tatramed.sk/exploit-695-cve-2025-30698/