RE: pgAdmin 4 || vulnerable pip modules - Mailing list pgadmin-support
| From | Chetan Lohi |
|---|---|
| Subject | RE: pgAdmin 4 || vulnerable pip modules |
| Date | |
| Msg-id | AMBPR06MB10283D621616BB4FA5B46E6F39B6BA@AMBPR06MB10283.eurprd06.prod.outlook.com Whole thread Raw |
| In response to | RE: pgAdmin 4 || vulnerable pip modules (Rogelio Villafana Sanchez <RVillafana-Sanchez@amdocs.com>) |
| List | pgadmin-support |
Hi Team,
Wiz itself does vulnerability scanning there is no additional tool involved.
Regards
Chetan Lohi
From: Rogelio Villafana Sanchez <RVillafana-Sanchez@amdocs.com>
Sent: Wednesday, February 18, 2026 11:54 PM
To: Aditya Toshniwal <aditya.toshniwal@enterprisedb.com>; Chetan Lohi <Chetan.Lohi@amdocs.com>
Cc: pgadmin-support@lists.postgresql.org; Akshay Swami <akshaysw@amdocs.com>; Manas . <Manas.1@amdocs.com>
Subject: RE: pgAdmin 4 || vulnerable pip modules
Hello @Chetan,
Could you help sharing the scan tool details used for the WIZ report?
Rogelio Villafaña
DevOps Specialist | ATT BSSe

From: Aditya Toshniwal <aditya.toshniwal@enterprisedb.com>
Sent: Tuesday, February 17, 2026 11:36 PM
To: Rogelio Villafana Sanchez <RVillafana-Sanchez@amdocs.com>
Cc: pgadmin-support@lists.postgresql.org; Akshay Swami <akshaysw@amdocs.com>; Manas . <Manas.1@amdocs.com>
Subject: Re: pgAdmin 4 || vulnerable pip modules
You don't often get email from aditya.toshniwal@enterprisedb.com. Learn why this is important |
CAUTION: This email is from an external source. Please don’t open any unknown links or attachments.
Hi Rogelio,
I checked the CVE list you shared and the package versions required to fix it. I then checked the pgAdmin venv for the actual installed versions and found them all to be newer.
What did you use to scan the CVEs in pgAdmin?
CVE ID | Package | Required Version (or newer) | Primary Action |
CVE-2025-68146 |
| v3.17.0 | Upgrade to prevent symlink-based file corruption. |
CVE-2025-68158 |
| v1.4.1 | Upgrade to ensure OAuth states are strictly bound to user sessions. |
CVE-2025-69277 |
| v1.0.21 | Update the underlying C library (often via |
CVE-2026-0994 |
| v5.29.3 | Upgrade to enforce stricter recursion limits on nested messages. |
CVE-2026-21226 |
| v1.31.0 | Critical: Upgrade immediately to disable insecure deserialization. |
CVE-2026-21441 |
| v2.3.1 | Upgrade to fix "Decompression Bomb" handling in redirects. |
CVE-2026-21860 |
| v3.1.4 | Upgrade to properly sanitize Windows reserved device names. |
CVE-2026-22701 |
| v3.18.0 | Upgrade to patch the |
CVE-2026-22702 |
| v20.29.2 | Upgrade to prevent symlink attacks during environment creation. |
CVE-2026-23490 |
| v0.6.2 | Upgrade to prevent memory exhaustion from malformed OIDs. |
CVE-2026-23949 |
| v6.1.0 | Upgrade to fix Path Traversal (Zip Slip) in |
CVE-2026-24049 |
| v0.45.2 | Upgrade to prevent unauthorized |
CVE-2026-26007 |
| v44.0.2 | Critical: Upgrade to ensure validation of SECT curve points. |
On Tue, Feb 17, 2026 at 9:18 PM Rogelio Villafana Sanchez <RVillafana-Sanchez@amdocs.com> wrote:
Hello PGAdmin support team,
Three weeks ago, we completed the upgrade of PGAdmin to v9.11, yet in our last vulnerabilities scan report, several pip modules came in the picture as vulnerable version.
As these are modules which come embedded in the site packages installer, we would like to confirm below question with you.
- Any existing/coming version that fix shared CVEs?
- Will it be in their roadmap. If yes when is the plan to fix it?
- Can we delete those files do we see any impact?
- We can see v9.12 was just released, but does this version fix the CVEs or have the modules on fixed version?
- Also, we know these CVEs might be false positive if yes, please share the description.
CVE-2025-68146
CVE-2025-68158
CVE-2025-69277
CVE-2026-0994
CVE-2026-21226
CVE-2026-21441
CVE-2026-21860
CVE-2026-22701
CVE-2026-22702
CVE-2026-23490
CVE-2026-23949
CVE-2026-24049
CVE-2026-26007
Rogelio Villafaña
DevOps Specialist | ATT BSSe
This email and the information contained herein is proprietary and confidential and subject to the Amdocs Email Terms of Service, which you may review at https://www.amdocs.com/about/email-terms-of-service
--
Thanks,
Aditya Toshniwal
pgAdmin Hacker | Sr. Staff SDE II | enterprisedb.com
"Don't Complain about Heat, Plant a TREE"
This message and the information contained herein is proprietary and confidential and subject to the Amdocs policy statement, you may review at https://www.amdocs.com/about/email-disclaimer
Amdocs Development Centre India Private Limited having CIN: U72200PN2004PTC0188320 converted into Amdocs Development Centre India LLP (A limited liability partnership with LLP Identification Number: AAI-6901 effective 28th Feb 2017)
Attachment
pgadmin-support by date: