phpPgAdmin 7.13.0 contains a remote command execution vulnerability that allows authenticated attackers to execute arbitrary system commands through SQL query manipulation. Attackers can create a custom table, upload a malicious .txt file, and use the COPY FROM PROGRAM command to execute operating system commands with the application's privileges.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 21 Jan 2026 17:45:00 +0000

Type Values Removed Values Added
Description phpPgAdmin 7.13.0 contains a remote command execution vulnerability that allows authenticated attackers to execute arbitrary system commands through SQL query manipulation. Attackers can create a custom table, upload a malicious .txt file, and use the COPY FROM PROGRAM command to execute operating system commands with the application's privileges.
Title phpPgAdmin 7.13.0 - COPY FROM PROGRAM Command Execution
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-21T17:27:37.681Z

Reserved: 2026-01-14T17:11:19.903Z

Link: CVE-2021-47853

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-21T18:16:14.800

Modified: 2026-01-21T18:16:14.800

Link: CVE-2021-47853

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses