{"id":"CVE-2023-0241","details":"pgAdmin 4 versions prior to v6.19 contains a directory traversal vulnerability. A user of the product may change another user's settings or alter the database.","aliases":["GHSA-9crj-hpxh-f6qg"],"modified":"2026-04-12T06:36:12.396937Z","published":"2023-03-27T21:15:10.147Z","related":["SUSE-SU-2023:1877-1","openSUSE-SU-2024:13667-1"],"references":[{"type":"ADVISORY","url":"https://jvn.jp/en/jp/JVN01398015/"},{"type":"FIX","url":"https://github.com/pgadmin-org/pgadmin4/issues/5734"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pgadmin-org/pgadmin4","events":[{"introduced":"0"},{"fixed":"e0a3420cd9d1f184f08872292754d6d7a1556248"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"6.19"}],"cpe":"cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["REL-1_0","REL-1_0-BETA1","REL-1_0-BETA2","REL-1_0-BETA3","REL-1_0-BETA4","REL-1_0-RC1","REL-1_1","REL-1_2","REL-1_3","REL-1_4","REL-1_5","REL-1_6","REL-2_0","REL-2_0-RC1","REL-2_0-RC2","REL-2_1","REL-3_0","REL-3_1","REL-3_2","REL-3_3","REL-3_4","REL-3_5","REL-3_6","REL-4_0","REL-4_1","REL-4_10","REL-4_11","REL-4_12","REL-4_13","REL-4_14","REL-4_15","REL-4_16","REL-4_17","REL-4_18","REL-4_19","REL-4_2","REL-4_20","REL-4_21","REL-4_22","REL-4_23","REL-4_24","REL-4_25","REL-4_26","REL-4_27","REL-4_28","REL-4_29","REL-4_3","REL-4_30","REL-4_4","REL-4_5","REL-4_6","REL-4_7","REL-4_8","REL-4_9","REL-5_0","REL-5_1","REL-5_2","REL-5_3","REL-5_4","REL-5_5","REL-5_6","REL-5_7","REL-6_0","REL-6_1","REL-6_10","REL-6_11","REL-6_12","REL-6_13","REL-6_14","REL-6_15","REL-6_16","REL-6_17","REL-6_18","REL-6_2","REL-6_3","REL-6_4","REL-6_5","REL-6_6","REL-6_7","REL-6_8","REL-6_9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0241.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}]}