Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3928: CWE-noinfo Not enough information in Commvault Web Server

0
High
VulnerabilityCVE-2025-3928cvecve-2025-3928
Published: Fri Apr 25 2025 (04/25/2025, 15:56:28 UTC)
Source: CVE
Vendor/Project: Commvault
Product: Web Server

Description

Commvault Web Server has an unspecified vulnerability that can be exploited by a remote, authenticated attacker. According to the Commvault advisory: "Webservers can be compromised through bad actors creating and executing webshells." Fixed in version 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms. This vulnerability was added to the CISA Known Exploited Vulnerabilities (KEV) Catalog on 2025-04-28.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:30:36 UTC

Technical Analysis

CVE-2025-3928 is a critical vulnerability in the Commvault Web Server component, affecting multiple versions on both Windows and Linux platforms. The vulnerability allows a remote attacker with valid authentication credentials to create and execute webshells on the server. Webshells are malicious scripts that provide attackers with remote command execution capabilities, enabling them to manipulate, exfiltrate, or destroy data and potentially pivot within the network. The vulnerability is unspecified in exact technical detail but is severe enough to warrant a CVSS 3.1 base score of 8.8, reflecting high impact on confidentiality, integrity, and availability. The attack vector is network-based with low attack complexity, requiring only privileges of an authenticated user but no further user interaction. The vulnerability has been addressed in Commvault versions 11.36.46, 11.32.89, 11.28.141, and 11.20.217. The inclusion of this CVE in the CISA Known Exploited Vulnerabilities Catalog underscores the urgency for organizations to patch promptly. While no public exploits are currently reported, the potential for exploitation is significant given the nature of webshells and the critical role of Commvault in enterprise data protection and backup operations.

Potential Impact

The exploitation of CVE-2025-3928 can lead to complete compromise of the Commvault Web Server, allowing attackers to execute arbitrary commands via webshells. This can result in unauthorized data access, data manipulation, deletion, or exfiltration, severely impacting data confidentiality and integrity. Availability may also be affected if attackers disrupt backup services or delete critical backup data, undermining disaster recovery capabilities. Given Commvault's widespread use in enterprise backup and data management, successful exploitation could disrupt business continuity, cause significant financial losses, and damage organizational reputation. The requirement for authentication limits exposure somewhat but does not eliminate risk, especially in environments with weak credential management or compromised accounts. The vulnerability poses a high risk to organizations relying on Commvault for critical data protection, including government, financial, healthcare, and large enterprise sectors worldwide.

Mitigation Recommendations

Organizations should immediately upgrade Commvault Web Server to the fixed versions 11.36.46, 11.32.89, 11.28.141, or 11.20.217 depending on their current deployment. In addition to patching, organizations should enforce strong authentication policies, including multi-factor authentication (MFA) for all Commvault users to reduce the risk of credential compromise. Regularly audit and monitor web server logs and file systems for indicators of webshell deployment or unusual command execution patterns. Implement network segmentation to limit access to Commvault servers only to authorized personnel and systems. Employ endpoint detection and response (EDR) tools capable of detecting webshell activity and anomalous behavior. Conduct periodic vulnerability assessments and penetration testing focused on backup infrastructure. Finally, maintain up-to-date backups stored offline or in immutable storage to ensure recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-24T19:55:32.578Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdcb59

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 2/26/2026, 9:30:36 PM

Last updated: 3/25/2026, 2:46:11 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses