CVE-2025-34028: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Commvault Command Center Innovation Release
The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
AI Analysis
Technical Summary
CVE-2025-34028 is a critical security vulnerability identified in Commvault's Command Center Innovation Release, specifically affecting versions 11.38.0 through 11.38.20. The vulnerability is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) combined with CWE-306 (Missing Authentication for Critical Function). It allows an unauthenticated attacker to upload ZIP files that represent installation packages. When these ZIP files are extracted by the vulnerable server, the path traversal flaw enables the attacker to write files outside the intended directory structure. This can be exploited to deploy malicious JSP (JavaServer Pages) files, which can then be executed remotely, resulting in remote code execution (RCE). The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The CVSS v3.1 base score is 9.3 (critical), reflecting the ease of exploitation and the severe impact on confidentiality, integrity, and availability. The vulnerability has been addressed in Commvault Command Center Innovation Release versions 11.38.20 (with patches SP38-CU20-433 and SP38-CU20-436) and 11.38.25 (with patches SP38-CU25-434 and SP38-CU25-438). No public exploits have been reported yet, but the vulnerability's nature and severity make it a high priority for remediation. The flaw stems from insufficient validation and sanitization of file paths during ZIP extraction, allowing attackers to escape restricted directories and place malicious code in executable locations.
Potential Impact
The impact of CVE-2025-34028 is severe for organizations using affected versions of Commvault Command Center Innovation Release. Successful exploitation allows unauthenticated attackers to execute arbitrary code remotely, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of backup and data management operations, and potential lateral movement within the network. Given Commvault's role in enterprise data protection and backup, exploitation could undermine data integrity and availability, causing significant operational and financial damage. The lack of authentication and user interaction requirements increases the risk of automated attacks and worm-like propagation. Organizations may face data breaches, ransomware deployment, or persistent backdoors. The vulnerability also poses risks to compliance with data protection regulations due to potential unauthorized data access and system manipulation.
Mitigation Recommendations
To mitigate CVE-2025-34028, organizations should immediately upgrade Commvault Command Center Innovation Release to version 11.38.20 or later, applying the specific patches SP38-CU20-433, SP38-CU20-436, SP38-CU25-434, or SP38-CU25-438 as appropriate. Until patches are applied, restrict network access to the Command Center interface to trusted IPs and implement strict firewall rules to limit exposure. Monitor logs for suspicious ZIP file uploads or unexpected file extraction activities. Employ application-layer filtering or web application firewalls (WAFs) to detect and block malicious payloads targeting the upload functionality. Conduct thorough audits of file system permissions to ensure that the application runs with the least privilege necessary, limiting the impact of any potential exploitation. Additionally, implement network segmentation to isolate backup infrastructure from critical production systems. Regularly review and update incident response plans to include scenarios involving remote code execution via path traversal vulnerabilities.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, India, Netherlands, Singapore
CVE-2025-34028: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Commvault Command Center Innovation Release
Description
The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-34028 is a critical security vulnerability identified in Commvault's Command Center Innovation Release, specifically affecting versions 11.38.0 through 11.38.20. The vulnerability is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) combined with CWE-306 (Missing Authentication for Critical Function). It allows an unauthenticated attacker to upload ZIP files that represent installation packages. When these ZIP files are extracted by the vulnerable server, the path traversal flaw enables the attacker to write files outside the intended directory structure. This can be exploited to deploy malicious JSP (JavaServer Pages) files, which can then be executed remotely, resulting in remote code execution (RCE). The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The CVSS v3.1 base score is 9.3 (critical), reflecting the ease of exploitation and the severe impact on confidentiality, integrity, and availability. The vulnerability has been addressed in Commvault Command Center Innovation Release versions 11.38.20 (with patches SP38-CU20-433 and SP38-CU20-436) and 11.38.25 (with patches SP38-CU25-434 and SP38-CU25-438). No public exploits have been reported yet, but the vulnerability's nature and severity make it a high priority for remediation. The flaw stems from insufficient validation and sanitization of file paths during ZIP extraction, allowing attackers to escape restricted directories and place malicious code in executable locations.
Potential Impact
The impact of CVE-2025-34028 is severe for organizations using affected versions of Commvault Command Center Innovation Release. Successful exploitation allows unauthenticated attackers to execute arbitrary code remotely, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of backup and data management operations, and potential lateral movement within the network. Given Commvault's role in enterprise data protection and backup, exploitation could undermine data integrity and availability, causing significant operational and financial damage. The lack of authentication and user interaction requirements increases the risk of automated attacks and worm-like propagation. Organizations may face data breaches, ransomware deployment, or persistent backdoors. The vulnerability also poses risks to compliance with data protection regulations due to potential unauthorized data access and system manipulation.
Mitigation Recommendations
To mitigate CVE-2025-34028, organizations should immediately upgrade Commvault Command Center Innovation Release to version 11.38.20 or later, applying the specific patches SP38-CU20-433, SP38-CU20-436, SP38-CU25-434, or SP38-CU25-438 as appropriate. Until patches are applied, restrict network access to the Command Center interface to trusted IPs and implement strict firewall rules to limit exposure. Monitor logs for suspicious ZIP file uploads or unexpected file extraction activities. Employ application-layer filtering or web application firewalls (WAFs) to detect and block malicious payloads targeting the upload functionality. Conduct thorough audits of file system permissions to ensure that the application runs with the least privilege necessary, limiting the impact of any potential exploitation. Additionally, implement network segmentation to isolate backup infrastructure from critical production systems. Regularly review and update incident response plans to include scenarios involving remote code execution via path traversal vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.545Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd89e3
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 2/27/2026, 1:19:03 PM
Last updated: 3/25/2026, 7:30:08 AM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.