CVE-2025-34028
Commvault Command Center Innovation Release Unathenticated Install Package Path Traversal
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- April 15, 2025
- Published Date
- April 22, 2025
- Last Updated
- July 30, 2025
- Vendor
- Commvault
- Product
- Command Center Innovation Release
- Description
- The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
- Tags
- Score
- 65.37% (Percentile: 98.36%) as of 2025-05-30
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
EPSS Score
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2025-05-02 00:00:00 UTC |
Recent Mentions
Follow-Up: Commvault Updates Advisory With Fixed Versions for Critical Commvault Command Center Vulnerability (CVE-2025-34028)
Source: Arctic Wolf • Published: 2025-05-09 20:09:15 UTC
Researcher Says Patched Commvault Bug Still Exploitable
Source: Dark Reading • Published: 2025-05-06 21:24:58 UTC
Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed
Source: TheHackerNews • Published: 2025-05-05 16:01:00 UTC
CISA Adds Two Known Exploited Vulnerabilities to Catalog
Source: All CISA Advisories • Published: 2025-05-02 12:00:00 UTC
Fire In The Hole, We’re Breaching The Vault - Commvault Remote Code Execution (CVE-2025-34028)
Source: Watchtower Labs • Published: 2025-04-24 10:01:56 UTC
Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely
Source: TheHackerNews • Published: 2025-04-24 10:00:00 UTC
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-34028.yaml | 2025-04-27 16:00:22 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
Mattb709/CVE-2025-34028-PoC-Commvault-RCE
Type: github • Created: 2025-05-06 16:44:41 UTC • Stars: 1
becrevex/Commvault-CVE-2025-34028
Type: github • Created: 2025-05-06 06:16:13 UTC • Stars: 0
watchtowrlabs/watchTowr-vs-Commvault-PreAuth-RCE-CVE-2025-34028
Type: github • Created: 2025-04-17 08:16:58 UTC • Stars: 10
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Detected by Nuclei
-
Added to KEVIntel
-
Proof of Concept Exploit Available