Description

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-34028, a critical vulnerability in Commvault Command Center, to its Known Exploited Vulnerabilities (KEV) catalog following confirmed active exploitation. Rated with a maximum CVSS score of 10.0, this critical path traversal vulnerability impacts Commvault version 11.38, particularly builds 11.38.0 to 11.38.19. The vulnerability has been fixed with security patches included in versions 11.38.20 and 11.38.25. CISA states that the vulnerability enables attackers to remotely execute arbitrary code on vulnerable systems without needing authentication. The issue stems from the misuse of a specific endpoint, "deployWebpackage.do," which enables a pre-authentication Server-Side Request Forgery (SSRF). Attackers can exploit this endpoint to upload maliciously crafted ZIP files that contain .JSP files. When these files are decompressed on the target system, they can trigger remote code execution. The vulnerability was discovered by watchTowr Labs, which detailed how this exploit path could be used to compromise systems without prior authentication. Although the specifics of how the vulnerability is being exploited in the wild are still unknown, this incident represents the second time a Commvault flaw after CVE-2025-3928 has been leveraged in actual attacks. Commvault acknowledged the recent activity, noting that only a limited number of customers were impacted and that no backup data was accessed without authorization. In response to the active exploitation, CISA has mandated that all Federal Civilian Executive Branch (FCEB) agencies apply the security updates by May 23, 2025, to prevent further compromise.