CVE-2026-7817
April 10, 2026
Local file inclusion (LFI) and server-side request forgery (SSRF) vulnerabilities in pgAdmin 4 LLM API configuration endpoints.
User-supplied api_key_file and api_url preferences were passed to the LLM provider clients without validation. An authenticated user could read arbitrary server-side files by pointing api_key_file at any path readable by the pgAdmin process, or coerce pgAdmin into making requests to internal targets (for example, cloud metadata services such as 169.254.169.254) by setting api_url, exploiting the chat path and the model-list endpoints.
The fix restricts api_key_file to the user’s private storage (server mode) or home directory (desktop mode), enforces a printable-ASCII key shape and a 1024-byte read cap, and gates api_url against a configurable allow-list (config.ALLOWED_LLM_API_URLS) at every entry point.
Affected versions
pgAdmin 4 >= 9.13, < 9.15
Severity
- CVSS 3.1: 6.5 (MEDIUM) —
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
References
- CVE: CVE-2026-7817
- Release notes: pgAdmin 4 9.15
Timeline
| Date | Event |
|---|---|
| 2026-04-03 | Vulnerability communicated to the pgAdmin 4 security team |
| 2026-04-07 | Vulnerability acknowledged and validated |
| 2026-05-11 | Issue published and fixed in v9.15 |