CVE-2025-34028

Scores

EPSS

0.626medium62.6%
0%20%40%60%80%100%

Percentile: 62.6%

CVSS

9.3critical4.0
0246810

CVSS Score: 9.3/10

All CVSS Scores

CVSS 4.0
9.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

CVSS 3.x
10.0

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Description

The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP.

This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

22CWE-22

Related Vulnerabilities

Exploits

Exploit ID: CVE-2025-34028

Source: github-poc

URL: https://github.com/Mattb709/CVE-2025-34028-PoC-Commvault-RCE

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: commvault

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:*",          "versionEndExcluding": "11.38.20",          "versionStartInclud...

Source: nvd

End of list