Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59468: Vulnerability in Veeam Backup and Recovery

0
Critical
VulnerabilityCVE-2025-59468cvecve-2025-59468
Published: Thu Jan 08 2026 (01/08/2026, 16:18:20 UTC)
Source: CVE Database V5
Vendor/Project: Veeam
Product: Backup and Recovery

Description

This vulnerability allows a Backup Administrator to perform remote code execution (RCE) as the postgres user by sending a malicious password parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:30:39 UTC

Technical Analysis

CVE-2025-59468 is a critical vulnerability identified in Veeam Backup and Recovery version 13.0.0 that allows remote code execution (RCE) as the postgres user. The flaw arises due to improper sanitization of the password parameter, enabling a Backup Administrator to inject malicious commands. This vulnerability is categorized under CWE-77, indicating command injection issues. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but necessitates high privileges (PR:H) as the attacker must already have Backup Administrator access. No user interaction is required (UI:N), and the scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. The impact on confidentiality and integrity is high (C:H/I:H), with a low impact on availability (A:L). Although no public exploits are reported yet, the potential for severe damage is significant because the postgres user typically has extensive database privileges, which can lead to full system compromise or data exfiltration. The vulnerability was reserved in September 2025 and published in January 2026, with a CVSS v3.1 score of 9.0, indicating critical severity. Veeam Backup and Recovery is widely used in enterprise environments for data protection, making this vulnerability particularly concerning for organizations relying on this software for backup and disaster recovery.

Potential Impact

The vulnerability allows an attacker with Backup Administrator privileges to execute arbitrary code as the postgres user, potentially leading to full compromise of the backup infrastructure. This can result in unauthorized access to sensitive backup data, manipulation or deletion of backups, and disruption of backup and recovery operations. The integrity and confidentiality of critical organizational data are at high risk, which can have cascading effects on business continuity and compliance with data protection regulations. The availability impact is lower but still present, as backup services could be disrupted or corrupted. Given the critical role of backup systems in disaster recovery, exploitation could severely hinder incident response and recovery efforts. Organizations worldwide that rely on Veeam Backup and Recovery, especially those in sectors like finance, healthcare, government, and critical infrastructure, face significant operational and reputational risks if this vulnerability is exploited.

Mitigation Recommendations

1. Immediately restrict Backup Administrator privileges to only trusted personnel and enforce the principle of least privilege. 2. Monitor backup system logs and network traffic for unusual or unauthorized commands, especially those involving password parameters or postgres user activity. 3. Implement network segmentation to isolate backup servers from general user networks and limit access to backup management interfaces. 4. Apply vendor patches or updates as soon as they become available; if no patch is currently released, contact Veeam support for recommended interim mitigations. 5. Conduct regular security audits and penetration testing focused on backup infrastructure to detect potential exploitation attempts. 6. Employ multi-factor authentication (MFA) for Backup Administrator accounts to reduce the risk of credential compromise. 7. Maintain offline or immutable backups to ensure recovery options in case of backup system compromise. 8. Educate backup administrators on secure password handling and the risks of command injection attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2025-09-16T15:00:07.876Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695fd9d02717593a334c2bd2

Added to database: 1/8/2026, 4:22:40 PM

Last enriched: 2/27/2026, 7:30:39 AM

Last updated: 3/24/2026, 12:49:23 AM

Views: 141

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses