CVE-2025-34028

The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:*
cpe:2.3:a:commvault:commvault:11.38.20:-:*:*:*:*:*:*
cpe:2.3:a:commvault:commvault:11.38.25:-:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

08 May 2025, 13:59

Type Values Removed Values Added
CPE cpe:2.3:a:commvault:commvault:11.38.25:-:*:*:*:*:*:*
cpe:2.3:a:commvault:commvault:11.38.20:-:*:*:*:*:*:*
References () https://github.com/watchtowrlabs/watchTowr-vs-Commvault-PreAuth-RCE-CVE-2025-34028 - () https://github.com/watchtowrlabs/watchTowr-vs-Commvault-PreAuth-RCE-CVE-2025-34028 - Exploit
References () https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/ - () https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/ - Third Party Advisory

07 May 2025, 22:15

Type Values Removed Values Added
CWE CWE-306
References
  • () https://github.com/watchtowrlabs/watchTowr-vs-Commvault-PreAuth-RCE-CVE-2025-34028 -
  • () https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/ -
Summary (en) A path traversal vulnerability in Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files, which, when expanded by the target server, result in Remote Code Execution. This issue affects Command Center Innovation Release: 11.38. (en) The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.

06 May 2025, 20:58

Type Values Removed Values Added
First Time Microsoft windows
Linux linux Kernel
Commvault
Microsoft
Commvault commvault
Linux
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
References () https://documentation.commvault.com/securityadvisories/CV_2025_04_1.html - () https://documentation.commvault.com/securityadvisories/CV_2025_04_1.html - Vendor Advisory

23 Apr 2025, 14:08

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de path traversal en Commvault Command Center Innovation Release permite que un agente no autenticado cargue archivos ZIP que, al ser expandidos por el servidor objetivo, provocan la ejecución remota de código. Este problema afecta a Command Center Innovation Release: 11.38.

22 Apr 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-22 17:16

Updated : 2025-05-08 13:59


NVD link : CVE-2025-34028

Mitre link : CVE-2025-34028

CVE.ORG link : CVE-2025-34028


JSON object : View

Products Affected

linux

  • linux_kernel

microsoft

  • windows

commvault

  • commvault
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-306

Missing Authentication for Critical Function