Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12776: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Commvault WebConsole

0
Low
VulnerabilityCVE-2025-12776cvecve-2025-12776cwe-79
Published: Wed Jan 07 2026 (01/07/2026, 22:03:05 UTC)
Source: CVE Database V5
Vendor/Project: Commvault
Product: WebConsole

Description

The Report Builder component of the application stores user input directly in a web page and displays it to other users, which raised concerns about a possible Cross-Site Scripting (XSS) attack. Proper management of this functionality helps ensure a secure and seamless user experience.  Although the user input is not validated in the report creation, these scripts are not executed when the report is run by end users. The script is executed when the report is modified through the report builder by a user with edit permissions. The Report Builder is part of the WebConsole.  The WebConsole package is currently end of life, and is no longer maintained. We strongly recommend against installing or using it in any production environment. However, if you choose to install it, for example, to access functionality like the Report Builder, it must be deployed within a fully isolated network that has no access to sensitive data or internet connectivity. This is a critical security precaution, as the retired package may contain unpatched vulnerabilities and is no longer supported with updates or fixes.

AI-Powered Analysis

AILast updated: 01/14/2026, 23:44:12 UTC

Technical Analysis

CVE-2025-12776 identifies a Cross-Site Scripting (XSS) vulnerability in the Report Builder component of the Commvault WebConsole product, specifically affecting versions 11.32.0 and 11.36.0. The issue stems from improper neutralization of user input (CWE-79) during web page generation, where input is stored directly in the report's web page without validation. This allows an attacker with edit permissions to inject malicious scripts that execute when the report is modified in the Report Builder interface. Notably, the scripts do not execute when the report is simply viewed or run by end users, limiting the attack surface. The WebConsole package is end-of-life and no longer maintained, meaning no patches or security updates will be provided, increasing the risk of exploitation if deployed. The vulnerability requires a user with edit privileges and user interaction to trigger script execution, which reduces its exploitability. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial authentication required, user interaction needed, and low impact on confidentiality and integrity, with no impact on availability. No known exploits have been reported in the wild. The vendor strongly recommends against using the WebConsole in production environments and suggests isolating it in fully segmented networks if used for legacy functionality like the Report Builder.

Potential Impact

For European organizations, the impact of this vulnerability is relatively low due to the limited execution context and requirement for edit permissions. However, if exploited, it could allow an attacker with legitimate edit access to execute malicious scripts within the Report Builder interface, potentially leading to session hijacking, privilege escalation, or lateral movement within the isolated environment. Since the WebConsole is end-of-life and no longer supported, organizations relying on it face increased risk from unpatched vulnerabilities and lack of vendor support. The isolation recommendation is critical to prevent exposure of sensitive data or systems. Organizations in sectors with strict data protection regulations (e.g., GDPR) must be cautious, as any compromise could lead to data breaches or compliance violations. The low CVSS score reflects limited impact, but the risk is amplified by the product's unsupported status and potential for overlooked vulnerabilities.

Mitigation Recommendations

Given the WebConsole is end-of-life, the primary mitigation is to discontinue its use in production environments entirely. If continued use is unavoidable, deploy the WebConsole and Report Builder within a fully isolated network segment that has no connectivity to sensitive data repositories or the internet. Restrict edit permissions strictly to trusted administrators and monitor all report modifications for suspicious activity. Employ network segmentation and strict access controls to limit exposure. Consider migrating to supported Commvault products or alternative solutions that receive regular security updates. Additionally, implement web application firewalls (WAFs) to detect and block potential XSS payloads targeting the Report Builder interface. Regularly audit user permissions and logs to detect unauthorized access or attempts to exploit this vulnerability. Since no patches are available, compensating controls and isolation are essential.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Commvault
Date Reserved
2025-11-05T20:18:49.381Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695edb802efadb62cf875e89

Added to database: 1/7/2026, 10:17:36 PM

Last enriched: 1/14/2026, 11:44:12 PM

Last updated: 2/7/2026, 4:03:56 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats