CVSS 3.1 Score 9.8 of 10 (high)


Published Sep 20, 2023
Updated: Nov 3, 2023
CWE ID 502


The vulnerability with the CVE ID name CVE-2023-40619 affects phpPgAdmin 7.14.4 and earlier versions. It is a result of deserialization of untrusted data in multiple locations, which allows for remote code execution. The vulnerability occurs when user-controlled data is directly passed to the PHP 'unserialize()' function, such as in the 'ma[]' POST parameter in the 'tables.php' functionality. This vulnerability poses a high risk to organizations as it can be exploited over a network without any user interaction required. It has a base severity rating of CRITICAL, with high impacts on integrity and confidentiality, and a base score of 9.8 out of 10. To remediate this vulnerability, organizations should update to a version of phpPgAdmin that is not affected by this issue.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-40619 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options