
A critical vulnerability has been uncovered in the Commvault Command Center, potentially allowing attackers to execute arbitrary code remotely without authentication.
Tracked as CVE-2025-34028, the flaw has been assigned a CVSS score of 9.0, indicating a severe risk.
Commvault disclosed the issue on April 17, 2025, warning that the flaw could result in a complete system compromise.
The vulnerability affects versions 11.38.0 through 11.38.19 of the 11.38 Innovation Release and has been resolved in subsequent updates.
The issue enables pre-authenticated remote code execution, making it particularly dangerous for internet-exposed systems.
At the root of the issue is an endpoint named “deploy-Web-package.do”, which lacks adequate host filtering. This opens the door to a Server-Side Request Forgery attack, where an attacker can force the application to interact with arbitrary servers.
Exploitation involves tricking the system into downloading a ZIP archive containing a malicious .JSP file, which then gets unzipped into a temporary directory.
This file can then be executed, leading to full code execution on the target environment.
To assist with detection, watchTowr has released a Detection Artefact Generator, allowing organizations to check if their systems are vulnerable.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.