Commvault Releases Security Updates to Address Multiple Vulnerabilities
Security researchers have demonstrated that 4 vulnerabilities in Commvault can be exploited in a chain to achieve unauthenticated remote code execution
Summary
Security researchers have demonstrated that 4 vulnerabilities in Commvault can be exploited in a chain to achieve unauthenticated remote code execution
Affected platforms
The following platforms are known to be affected:
Threat details
Public proof-of-concept exploit available
Security researchers at watchTowr have published technical details for how the vulnerabilities in Commvault can be exploited in 2 different chains to achieve pre-authentication remote code execution (RCE).
Backup and disaster recovery solutions are highly valuable targets for cyber criminals. The NHS England National CSOC assesses future exploitation as likely.
Introduction
Commvault has released security advisories to address 4 vulnerabilities in Commvault Windows and Linux. Security researchers have demonstrated the ability for these vulnerabilities to be chained together by an unauthenticated remote attacker to perform remote code execution on the Commvault server.
- CVE-2025-57788 - Unauthorized API Access Risk - CVSSv4 6.9
- CVE-2025-57789 - Vulnerability in Initial Administrator Login Process - CVSSv4 5.3
- CVE-2025-57790 - Path Traversal Vulnerability - CVSSv4 8.7
- CVE-2025-57791 - Argument Injection Vulnerability in CommServe - CVSSv4 6.9
Remediation advice
Affected organisations are strongly encouraged to review the Commvault Security Advisories page and apply the relevant updates as soon as possible.
For clarity, the remediated versions are:
- 11.32.102
- 11.36.60
- 11.38.32
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 21 August 2025 3:00 pm