Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34028: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Commvault Command Center Innovation Release

0
Critical
VulnerabilityCVE-2025-34028cvecve-2025-34028cwe-22cwe-306
Published: Tue Apr 22 2025 (04/22/2025, 16:32:23 UTC)
Source: CVE
Vendor/Project: Commvault
Product: Command Center Innovation Release

Description

The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:19:03 UTC

Technical Analysis

CVE-2025-34028 is a critical security vulnerability identified in Commvault's Command Center Innovation Release, specifically affecting versions 11.38.0 through 11.38.20. The vulnerability is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) combined with CWE-306 (Missing Authentication for Critical Function). It allows an unauthenticated attacker to upload ZIP files that represent installation packages. When these ZIP files are extracted by the vulnerable server, the path traversal flaw enables the attacker to write files outside the intended directory structure. This can be exploited to deploy malicious JSP (JavaServer Pages) files, which can then be executed remotely, resulting in remote code execution (RCE). The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The CVSS v3.1 base score is 9.3 (critical), reflecting the ease of exploitation and the severe impact on confidentiality, integrity, and availability. The vulnerability has been addressed in Commvault Command Center Innovation Release versions 11.38.20 (with patches SP38-CU20-433 and SP38-CU20-436) and 11.38.25 (with patches SP38-CU25-434 and SP38-CU25-438). No public exploits have been reported yet, but the vulnerability's nature and severity make it a high priority for remediation. The flaw stems from insufficient validation and sanitization of file paths during ZIP extraction, allowing attackers to escape restricted directories and place malicious code in executable locations.

Potential Impact

The impact of CVE-2025-34028 is severe for organizations using affected versions of Commvault Command Center Innovation Release. Successful exploitation allows unauthenticated attackers to execute arbitrary code remotely, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of backup and data management operations, and potential lateral movement within the network. Given Commvault's role in enterprise data protection and backup, exploitation could undermine data integrity and availability, causing significant operational and financial damage. The lack of authentication and user interaction requirements increases the risk of automated attacks and worm-like propagation. Organizations may face data breaches, ransomware deployment, or persistent backdoors. The vulnerability also poses risks to compliance with data protection regulations due to potential unauthorized data access and system manipulation.

Mitigation Recommendations

To mitigate CVE-2025-34028, organizations should immediately upgrade Commvault Command Center Innovation Release to version 11.38.20 or later, applying the specific patches SP38-CU20-433, SP38-CU20-436, SP38-CU25-434, or SP38-CU25-438 as appropriate. Until patches are applied, restrict network access to the Command Center interface to trusted IPs and implement strict firewall rules to limit exposure. Monitor logs for suspicious ZIP file uploads or unexpected file extraction activities. Employ application-layer filtering or web application firewalls (WAFs) to detect and block malicious payloads targeting the upload functionality. Conduct thorough audits of file system permissions to ensure that the application runs with the least privilege necessary, limiting the impact of any potential exploitation. Additionally, implement network segmentation to isolate backup infrastructure from critical production systems. Regularly review and update incident response plans to include scenarios involving remote code execution via path traversal vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.545Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd89e3

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 2/27/2026, 1:19:03 PM

Last updated: 3/25/2026, 7:30:08 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses