A flaw in the critical Commvault command center allows attackers to execute code remotely

2 Min Read
2 Min Read

The Commvault Command Center discloses important security flaws that allow arbitrary code execution in affected installations.

Tracked vulnerabilities CVE-2025-34028carry a CVSS score of 9.0 out of a maximum of 10.0.

“A critical security vulnerability has been identified in the Command Center installation, allowing remote attackers to execute arbitrary code without authentication,” Commvault said in an advisory published on April 17, 2025.

It affected versions 11.38.0 to 11.38.19 to 11.38 innovation releases and was resolved in the next version –

Sonny MacDonald, a researcher at Watchtowr Labs, who was recognized as discovering and reporting the defect on April 7, 2025, said in a report shared by hacker news and that it could be exploited to achieve pre-recognized remote code execution.

Specifically, this issue is rooted in an endpoint called “deploywebpackage.do” and triggers what is called pre-accepted server-side request forgery (SSRF) due to the fact that “there is no filtering about how the host can communicate with.”

Worse, code execution can be achieved by escalating the flaws in SSRF to use a ZIP archive file containing malicious .JSP files. The entire sequence of events is:

  • Send the http request to /commandcenter/deploywebpackage.do.
  • The contents of the zip file will be unzipped into the .tmp directory under attacker’s control
  • Use the ServicePack parameter to traverse the .tmp directory to a pre-recognized face directory on the server, such as .././Reports/metricsupload/shell
  • Run SSRF via /commandcenter/deploywebpackage.do
  • Run the shell from /reports/metricsupload/shell/.tmp/dist-cc/dist-cc/shell.jsp

WatchTowr has created a detection artifact generator that organizations can use to determine if an instance is vulnerable to a vulnerability.

With vulnerabilities in backup and replication software such as Veeam and Nakivo undergoing active exploitation in the wild, it is essential for users to apply the mitigation they need to prevent potential threats.

See also  Open Source Web Application Firewall with Zero-Day Detection and Bot Protection
Share This Article
Leave a comment