CVE-2025-34028

The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:*
cpe:2.3:a:commvault:commvault:11.38.20:-:*:*:*:*:*:*
cpe:2.3:a:commvault:commvault:11.38.25:-:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

08 May 2025, 13:59

Type Values Removed Values Added
CPE cpe:2.3:a:commvault:commvault:11.38.20:-:*:*:*:*:*:*
cpe:2.3:a:commvault:commvault:11.38.25:-:*:*:*:*:*:*
References () https://github.com/watchtowrlabs/watchTowr-vs-Commvault-PreAuth-RCE-CVE-2025-34028 - () https://github.com/watchtowrlabs/watchTowr-vs-Commvault-PreAuth-RCE-CVE-2025-34028 - Exploit
References () https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/ - () https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/ - Third Party Advisory

07 May 2025, 22:15

Type Values Removed Values Added
References
  • () https://github.com/watchtowrlabs/watchTowr-vs-Commvault-PreAuth-RCE-CVE-2025-34028 -
  • () https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/ -
Summary (en) A path traversal vulnerability in Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files, which, when expanded by the target server, result in Remote Code Execution. This issue affects Command Center Innovation Release: 11.38. (en) The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.
CWE CWE-306

06 May 2025, 20:58

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
References () https://documentation.commvault.com/securityadvisories/CV_2025_04_1.html - () https://documentation.commvault.com/securityadvisories/CV_2025_04_1.html - Vendor Advisory
First Time Microsoft
Linux
Commvault commvault
Commvault
Microsoft windows
Linux linux Kernel

23 Apr 2025, 14:08

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de path traversal en Commvault Command Center Innovation Release permite que un agente no autenticado cargue archivos ZIP que, al ser expandidos por el servidor objetivo, provocan la ejecución remota de código. Este problema afecta a Command Center Innovation Release: 11.38.

22 Apr 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-22 17:16

Updated : 2025-05-08 13:59


NVD link : CVE-2025-34028

Mitre link : CVE-2025-34028

CVE.ORG link : CVE-2025-34028


JSON object : View

Products Affected

commvault

  • commvault

microsoft

  • windows

linux

  • linux_kernel
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-306

Missing Authentication for Critical Function