Vulnerability Details CVE-2024-3116
pgAdmin <= 8.4 is affected by a Remote Code Execution (RCE) vulnerability through the validate binary path API. This vulnerability allows attackers to execute arbitrary code on the server hosting PGAdmin, posing a severe risk to the database management system's integrity and the security of the underlying data.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.907
EPSS Ranking 99.6%
CVSS Severity
CVSS v3 Score 7.4
Products affected by CVE-2024-3116
-
cpe:2.3:a:pgadmin:pgadmin_4:-
-
cpe:2.3:a:pgadmin:pgadmin_4:1.0
-
cpe:2.3:a:pgadmin:pgadmin_4:1.1
-
cpe:2.3:a:pgadmin:pgadmin_4:1.2
-
cpe:2.3:a:pgadmin:pgadmin_4:1.3
-
cpe:2.3:a:pgadmin:pgadmin_4:1.4
-
cpe:2.3:a:pgadmin:pgadmin_4:1.5
-
cpe:2.3:a:pgadmin:pgadmin_4:1.6
-
cpe:2.3:a:pgadmin:pgadmin_4:2.0
-
cpe:2.3:a:pgadmin:pgadmin_4:2.1
-
cpe:2.3:a:pgadmin:pgadmin_4:3.0
-
cpe:2.3:a:pgadmin:pgadmin_4:3.1
-
cpe:2.3:a:pgadmin:pgadmin_4:3.2
-
cpe:2.3:a:pgadmin:pgadmin_4:3.3
-
cpe:2.3:a:pgadmin:pgadmin_4:3.4
-
cpe:2.3:a:pgadmin:pgadmin_4:3.5
-
cpe:2.3:a:pgadmin:pgadmin_4:3.6
-
cpe:2.3:a:pgadmin:pgadmin_4:4.0
-
cpe:2.3:a:pgadmin:pgadmin_4:4.1
-
cpe:2.3:a:pgadmin:pgadmin_4:4.10
-
cpe:2.3:a:pgadmin:pgadmin_4:4.11
-
cpe:2.3:a:pgadmin:pgadmin_4:4.12
-
cpe:2.3:a:pgadmin:pgadmin_4:4.13
-
cpe:2.3:a:pgadmin:pgadmin_4:4.14
-
cpe:2.3:a:pgadmin:pgadmin_4:4.15
-
cpe:2.3:a:pgadmin:pgadmin_4:4.16
-
cpe:2.3:a:pgadmin:pgadmin_4:4.17
-
cpe:2.3:a:pgadmin:pgadmin_4:4.18
-
cpe:2.3:a:pgadmin:pgadmin_4:4.19
-
cpe:2.3:a:pgadmin:pgadmin_4:4.2
-
cpe:2.3:a:pgadmin:pgadmin_4:4.20
-
cpe:2.3:a:pgadmin:pgadmin_4:4.21
-
cpe:2.3:a:pgadmin:pgadmin_4:4.22
-
cpe:2.3:a:pgadmin:pgadmin_4:4.23
-
cpe:2.3:a:pgadmin:pgadmin_4:4.24
-
cpe:2.3:a:pgadmin:pgadmin_4:4.25
-
cpe:2.3:a:pgadmin:pgadmin_4:4.26
-
cpe:2.3:a:pgadmin:pgadmin_4:4.27
-
cpe:2.3:a:pgadmin:pgadmin_4:4.28
-
cpe:2.3:a:pgadmin:pgadmin_4:4.29
-
cpe:2.3:a:pgadmin:pgadmin_4:4.3
-
cpe:2.3:a:pgadmin:pgadmin_4:4.30
-
cpe:2.3:a:pgadmin:pgadmin_4:4.4
-
cpe:2.3:a:pgadmin:pgadmin_4:4.5
-
cpe:2.3:a:pgadmin:pgadmin_4:4.6
-
cpe:2.3:a:pgadmin:pgadmin_4:4.7
-
cpe:2.3:a:pgadmin:pgadmin_4:4.8
-
cpe:2.3:a:pgadmin:pgadmin_4:4.9
-
cpe:2.3:a:pgadmin:pgadmin_4:5.0
-
cpe:2.3:a:pgadmin:pgadmin_4:5.1
-
cpe:2.3:a:pgadmin:pgadmin_4:5.2
-
cpe:2.3:a:pgadmin:pgadmin_4:5.3
-
cpe:2.3:a:pgadmin:pgadmin_4:5.4
-
cpe:2.3:a:pgadmin:pgadmin_4:5.5
-
cpe:2.3:a:pgadmin:pgadmin_4:5.6
-
cpe:2.3:a:pgadmin:pgadmin_4:5.7
-
cpe:2.3:a:pgadmin:pgadmin_4:6.0
-
cpe:2.3:a:pgadmin:pgadmin_4:6.1
-
cpe:2.3:a:pgadmin:pgadmin_4:6.10
-
cpe:2.3:a:pgadmin:pgadmin_4:6.11
-
cpe:2.3:a:pgadmin:pgadmin_4:6.12
-
cpe:2.3:a:pgadmin:pgadmin_4:6.13
-
cpe:2.3:a:pgadmin:pgadmin_4:6.14
-
cpe:2.3:a:pgadmin:pgadmin_4:6.15
-
cpe:2.3:a:pgadmin:pgadmin_4:6.16
-
cpe:2.3:a:pgadmin:pgadmin_4:6.17
-
cpe:2.3:a:pgadmin:pgadmin_4:6.18
-
cpe:2.3:a:pgadmin:pgadmin_4:6.19
-
cpe:2.3:a:pgadmin:pgadmin_4:6.2
-
cpe:2.3:a:pgadmin:pgadmin_4:6.20
-
cpe:2.3:a:pgadmin:pgadmin_4:6.21
-
cpe:2.3:a:pgadmin:pgadmin_4:6.3
-
cpe:2.3:a:pgadmin:pgadmin_4:6.4
-
cpe:2.3:a:pgadmin:pgadmin_4:6.5
-
cpe:2.3:a:pgadmin:pgadmin_4:6.6
-
cpe:2.3:a:pgadmin:pgadmin_4:6.7
-
cpe:2.3:a:pgadmin:pgadmin_4:6.8
-
cpe:2.3:a:pgadmin:pgadmin_4:6.9
-
cpe:2.3:a:pgadmin:pgadmin_4:7.0
-
cpe:2.3:a:pgadmin:pgadmin_4:7.1
-
cpe:2.3:a:pgadmin:pgadmin_4:7.2
-
cpe:2.3:a:pgadmin:pgadmin_4:7.3
-
cpe:2.3:a:pgadmin:pgadmin_4:7.4
-
cpe:2.3:a:pgadmin:pgadmin_4:7.5
-
cpe:2.3:a:pgadmin:pgadmin_4:7.6
-
cpe:2.3:a:pgadmin:pgadmin_4:7.7
-
cpe:2.3:a:pgadmin:pgadmin_4:7.8
-
cpe:2.3:a:pgadmin:pgadmin_4:8.0
-
cpe:2.3:a:pgadmin:pgadmin_4:8.1
-
cpe:2.3:a:pgadmin:pgadmin_4:8.2
-
cpe:2.3:a:pgadmin:pgadmin_4:8.3
-
cpe:2.3:a:pgadmin:pgadmin_4:8.4
-
cpe:2.3:o:fedoraproject:fedora:39