Critical Vulnerability in Commvault Command Center Enables Unauthenticated Remote Code Execution
A serious security vulnerability has been identified in the “Commvault Command Center,” a management console product used for backup and recovery operations. Security researchers have disclosed a critical path traversal vulnerability (CVE-2025-34028) that allows attackers to execute arbitrary code remotely without requiring authentication.
The flaw affects “Command Center Innovation Release 11.38” and can be exploited by uploading specially crafted ZIP files that, when extracted on the server, enable malicious code execution. This vulnerability has received the highest possible Common Vulnerability Scoring System (CVSSv3.1) base score of 10.0, categorizing it as “Critical” – the most severe rating on the four-level scale.
Commvault released security patches on April 10, 2025, addressing this vulnerability in versions 11.38.25 and 11.38.20. The company is urging all users to update their systems immediately.
For organizations unable to apply the security updates promptly, Commvault strongly recommends isolating the product from external network access to prevent potential exploitation.
Security experts emphasize the urgency of addressing this vulnerability due to its critical severity rating and the potential for complete system compromise if successfully exploited.