CVE-2025-34028: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Commvault Command Center Innovation Release
The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
AI Analysis
Technical Summary
CVE-2025-34028 is a path traversal vulnerability (CWE-22) combined with improper access control (CWE-306) in the Commvault Command Center Innovation Release, specifically versions 11.38.0 through 11.38.20. The vulnerability arises because the product allows unauthenticated actors to upload ZIP files representing install packages. When these ZIP files are expanded on the target server, the path traversal flaw enables the attacker to write files outside the intended directory structure. This can be exploited to deploy malicious JSP files, which the server may execute, resulting in remote code execution (RCE). The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The issue is addressed in versions 11.38.20 (with SP38-CU20-433 and SP38-CU20-436) and 11.38.25 (with SP38-CU25-434 and SP38-CU25-438). The CVSS 3.1 base score of 9.3 reflects the critical nature of the flaw, highlighting its ease of exploitation and severe impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the vulnerability's characteristics suggest it could be rapidly weaponized. The root cause is insufficient validation and sanitization of file paths during ZIP extraction, combined with lack of authentication controls on the upload functionality.
Potential Impact
For European organizations, the impact of this vulnerability is severe. Commvault is widely used for data protection, backup, and disaster recovery, often in sectors such as finance, healthcare, government, and critical infrastructure. Successful exploitation could lead to full system compromise, data theft, ransomware deployment, or disruption of backup operations, severely affecting business continuity and data integrity. The ability to execute arbitrary code remotely without authentication increases the risk of widespread attacks, potentially impacting multiple organizations simultaneously. Given the critical nature of backup systems, exploitation could also undermine incident response and recovery efforts. Organizations handling sensitive or regulated data face additional compliance and reputational risks. The vulnerability's network-exploitable nature means attackers can target exposed Command Center instances directly, increasing the threat surface for European enterprises with internet-facing management consoles or insufficient network segmentation.
Mitigation Recommendations
European organizations should immediately verify their Commvault Command Center version and apply the patches available in versions 11.38.20 (SP38-CU20-433, SP38-CU20-436) or 11.38.25 (SP38-CU25-434, SP38-CU25-438). If patching is not immediately possible, restrict network access to the Command Center upload functionality using firewalls or network segmentation to limit exposure. Implement strict input validation and file path sanitization controls where possible. Monitor logs for unusual upload activity or unexpected file creations, especially JSP files outside expected directories. Employ application-layer firewalls or intrusion detection systems to detect and block exploitation attempts. Conduct thorough audits of backup infrastructure to ensure no unauthorized files have been deployed. Educate IT and security teams about this vulnerability to prioritize remediation and incident response readiness. Finally, review and harden authentication and authorization controls around management interfaces to prevent unauthorized access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-34028: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Commvault Command Center Innovation Release
Description
The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
AI-Powered Analysis
Technical Analysis
CVE-2025-34028 is a path traversal vulnerability (CWE-22) combined with improper access control (CWE-306) in the Commvault Command Center Innovation Release, specifically versions 11.38.0 through 11.38.20. The vulnerability arises because the product allows unauthenticated actors to upload ZIP files representing install packages. When these ZIP files are expanded on the target server, the path traversal flaw enables the attacker to write files outside the intended directory structure. This can be exploited to deploy malicious JSP files, which the server may execute, resulting in remote code execution (RCE). The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The issue is addressed in versions 11.38.20 (with SP38-CU20-433 and SP38-CU20-436) and 11.38.25 (with SP38-CU25-434 and SP38-CU25-438). The CVSS 3.1 base score of 9.3 reflects the critical nature of the flaw, highlighting its ease of exploitation and severe impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the vulnerability's characteristics suggest it could be rapidly weaponized. The root cause is insufficient validation and sanitization of file paths during ZIP extraction, combined with lack of authentication controls on the upload functionality.
Potential Impact
For European organizations, the impact of this vulnerability is severe. Commvault is widely used for data protection, backup, and disaster recovery, often in sectors such as finance, healthcare, government, and critical infrastructure. Successful exploitation could lead to full system compromise, data theft, ransomware deployment, or disruption of backup operations, severely affecting business continuity and data integrity. The ability to execute arbitrary code remotely without authentication increases the risk of widespread attacks, potentially impacting multiple organizations simultaneously. Given the critical nature of backup systems, exploitation could also undermine incident response and recovery efforts. Organizations handling sensitive or regulated data face additional compliance and reputational risks. The vulnerability's network-exploitable nature means attackers can target exposed Command Center instances directly, increasing the threat surface for European enterprises with internet-facing management consoles or insufficient network segmentation.
Mitigation Recommendations
European organizations should immediately verify their Commvault Command Center version and apply the patches available in versions 11.38.20 (SP38-CU20-433, SP38-CU20-436) or 11.38.25 (SP38-CU25-434, SP38-CU25-438). If patching is not immediately possible, restrict network access to the Command Center upload functionality using firewalls or network segmentation to limit exposure. Implement strict input validation and file path sanitization controls where possible. Monitor logs for unusual upload activity or unexpected file creations, especially JSP files outside expected directories. Employ application-layer firewalls or intrusion detection systems to detect and block exploitation attempts. Conduct thorough audits of backup infrastructure to ensure no unauthorized files have been deployed. Educate IT and security teams about this vulnerability to prioritize remediation and incident response readiness. Finally, review and harden authentication and authorization controls around management interfaces to prevent unauthorized access.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.545Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd89e3
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 11/29/2025, 4:07:07 AM
Last updated: 1/7/2026, 8:56:49 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.