Commvault Command Center: path traversal in Commvault Command Center leading to remote code execution (CVE-2025-34028) #shorts

Summary

Welcome to today’s cybersecurity briefing. We’re discussing CVE-2025-34028, a newly disclosed, maximum-severity vulnerability in Commvault Command Center Innovation Release 11.38. Discovered by watchTowr Labs, this flaw allows unauthenticated attackers to achieve remote code execution on affected servers.

Product details

Commvault Command Center is a web-based management console for data protection, backup, and recovery workflows. The Innovation Release 11.38 is the latest major update, offering streamlined dashboarding, policy-driven automation, and API integrations for hybrid and multi-cloud environments.

Vulnerability type summary

This issue stems from an improper limitation of pathname to a restricted directory, classified as CWE-22: Path Traversal. An attacker can bypass directory restrictions by crafting a ZIP archive with malicious file paths, causing the server to expand and write files outside the intended workspace.

Details of the vulnerability

An unauthenticated actor uploads a specially crafted ZIP file to the Command Center interface. When the server extracts the archive, it honors ‘../’ sequences or absolute paths embedded in the filenames, placing payloads in sensitive system folders. The attacker’s code runs with the privilege of the web service, enabling full remote code execution. A public proof-of-concept is circulating, and Metasploit modules are expected soon.

Conclusion

If you’re running Commvault Command Center Innovation Release 11.38, consider yourself at risk. Immediately upgrade to the patched version when it becomes available, or apply vendor workarounds documented by Commvault. Monitor file upload endpoints and audit extraction logs for suspicious activity. Stay tuned for further updates and always prioritize timely patching to defend against emerging threats.

Watch the full video on YouTube: CVE-2025-34028

Remediation and exploitation details

This chain involves the following actors

This following systems are involved

Attack entry point

Remediation actions

Exploitation actions

Related Content

NOTE: The following related content has not been vetted and may be unsafe.

CVE database technical details

CVE ID
CVE-2025-34028
Description
The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.
Provider
VulnCheck
CWE / problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),CWE-306 Missing Authentication for Critical Function
Affected Software Versions
Commvault:Command Center Innovation Release:[{'status': 'affected', 'version': '11.38', 'versionType': 'semver'}]
Date Published
2025-04-22T16:32:23.446Z
Last Updated
2025-05-07T22:09:23.958Z