CVE-2025-57791
BaseFortify
Publication date: 2025-08-20
Last updated on: 2025-09-10
Assigner: Commvault
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| commvault | commvault | to 11.36.60 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-88 | The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an argument injection flaw in Commvault's CommServe component caused by insufficient input validation. It allows remote attackers to inject or manipulate command-line arguments passed to internal components, which can result in the attacker gaining a valid user session with low privilege access. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker to gain a valid user session with low privilege access to the affected Commvault components. This could potentially allow the attacker to perform unauthorized actions within the scope of that low privilege role, possibly compromising system integrity or confidentiality. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
To detect this vulnerability, administrators should log into the Commvault Command Center, navigate to Manage > Servers, filter by the relevant server role (e.g., Web Server), and verify that all servers are running the resolved maintenance release version 11.32.102 or later for 11.32.x series, or 11.36.60 or later for 11.36.x series. There are no specific command-line commands provided for detection in the resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include installing the resolved maintenance releases on the CommServe, Web Server, and Command Center components. Specifically, upgrade to version 11.32.102 or later for the 11.32.x series, and 11.36.60 or later for the 11.36.x series. Commvault SaaS customers are not affected and do not need to take action. [1]