CVE-2026-7814 PUBLISHED

pgAdmin 4: Stored XSS via crafted PostgreSQL object names in Browser Tree and Explain Visualizer

Assigner: PostgreSQL
Reserved: 04.05.2026 Published: 11.05.2026 Updated: 11.05.2026

Stored cross-site scripting (XSS) vulnerability in pgAdmin 4 Browser Tree and Explain Visualizer modules.

User-controlled PostgreSQL object names (database, schema, table, column, etc.) were assigned to DOM elements via innerHTML, allowing crafted object names containing HTML markup to execute attacker-supplied JavaScript in the browser of any pgAdmin user who navigated to or executed EXPLAIN over the malicious object.

Fix replaces innerHTML with textContent.

This issue affects pgAdmin 4: before 9.15.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
CVSS Score: 4.8

Authenticated pgAdmin user with INSERT/CREATE privileges on a database object whose name a victim views in pgAdmin's Browser Tree or Explain output. PR:H reflects that planting the malicious object name requires DDL privileges in addition to a pgAdmin login.

Product Status

Vendor pgadmin.org
Product pgAdmin 4
Versions Default: affected
  • affected from 6.9 to 9.15 (excl.)

Credits

  • Fahar Abbas finder

References