Commvault releases patches for two nasty bug chains after exploits proven
(2025/08/20)
- Reference: 1755709437
- News link: https://www.theregister.co.uk/2025/08/20/commvault_bug_chains_patched/
- Source link:
Researchers at watchTowr just published working proof-of-concept exploits for two unauthenticated remote code execution bug chains in backup giant Commvault.
They reported the four vulnerabilities to Commvault in April, and the vendor released patches on Wednesday. Commvault SaaS is unaffected.
All users are advised to apply the available updates, especially since the first of the two chains works against all unpatched instances.
[1]
The first chain involves two vulnerabilities ( [2]CVE-2025-57791 and [3]CVE-2025-57790 ), an argument injection in CommServe and a path traversal bug respectively. The severity scores for the flaws are not especially concerning on their own, but chained together they become more dangerous.
[4]
[5]
In Commvault's advisory, it describes CVE-2025-57791 as a vulnerability that allows attackers to retrieve a valid user session for a low-privilege role, assigning it a CVSS score of 6.9 (medium severity).
In its [6]PoC , watchTowr painted a different view, showing how to gain access to a local admin account.
[7]
The argument injection bug at the heart of this chain lies in one of Commvault's QCommands. They're used to carry out admin functions, and their use is protected by requiring a valid API token.
QLogin is a QCommand that handles authentication, and researchers found that by altering fields in the request to the Login endpoint, they could bypass the need for a password and generate an API token for the local admin user.
The second vulnerability in the chain (CVE-2025-57790) carries the highest severity score of all four (8.7) that received patches today and is a [8]path traversal flaw, a bug class [9]CISA says [10]should have been eradicated long ago .
[11]
The researchers said an absolute path traversal in QCommand output writer allowed them to write a JSP webshell directly into the webroot, achieving RCE.
"This combination is exploitable against any unpatched Commvault instance," the researchers blogged. "We are not aware of preconditions or environmental limitations that would block it. It's as bad as it sounds, so we will not be publishing a Detection Artifact Generator for this one."
The second chain, which watchTowr concedes is dependent on specific but common conditions within a target's environment being met, also makes use of the same path traversal bug to ultimately achieve RCE, but does so after exploiting two additional, medium-severity flaws.
First, there's [12]CVE-2025-57788 , which allows unauthenticated users to call APIs to bypass authentication.
WatchTowr found that by sending a specially crafted request to the Commvault server, they could leak the password of the low-privileged _PublicSharingUser_ account via a returned JSON web token.
It carries a 6.9 severity score, and [13]Commvault says that role-based access control can help limit customers' exposure to the bug, but falls short of serving as a workaround.
[14]Another massive security snafu hits Microsoft, but don't expect it to stick
[15]CitrixBleed 2 exploits are on the loose as security researchers yell and wave their hands
[16]Citrix bleeds again: This time a zero-day exploited – patch now
[17]Commvault fixes critical Command Center issue after flaw finder alert
[18]CVE-2025-57789 comes after, and allows the attacker to gain admin access, and full control of the target system.
The bug bridges the gap between CVE-2025-57788 and CVE-2025-57790, which can't complete as a two-bug chain because the _PublicSharingUser_ account doesn't have the privileges to drop a webshell.
WatchTowr's Sonny and Piotr Bazydlo, who worked together on the research, found that the low-privileged account could retrieve user details, including password encryption keys for admin accounts.
They then found the method in Commvault's code used to decrypt passwords, and used it against the retrieved admin password to log in as that admin.
Notably, during watchTowr's version of the disclosure timeline, Commvault originally pushed back on this bug, saying it couldn't be feasibly exploited in real-world scenarios.
The vendor argued the flaw was impractical, which may explain why the make-me-admin bug carries the lowest severity score (5.3) of all four vulnerabilities, namely because of the conditions that highly limit the exploitability.
Note that the retrieved password was not hashed, but encrypted. This is only the case when the product is initially set up – the admin password set during this process is encrypted, but if it is ever changed, then it is hashed, making it more secure.
In addition, according to watchTowr, the day before it disclosed the flaw to Commvault, the backup vendor issued version 11.38.25, which introduced password hashing after the first successful login.
In response, watchTowr stood by its findings: "Even so, this chain will likely still impact many Commvault instances. And if it doesn't, the first chain we described remains unaffected by these limitations.
"It's also worth noting that many Commvault administrators don't use the built-in admin account at all, which could leave this attack path viable for longer."
The Register contacted Commvault for a response. ®
Get our [19]Tech Resources
[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aKZFeUQhL9a1kkOpVVaWnwAAAAc&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[2] https://documentation.commvault.com/securityadvisories/CV_2025_08_1.html?ref=labs.watchtowr.com
[3] https://documentation.commvault.com/securityadvisories/CV_2025_08_2.html?ref=labs.watchtowr.com
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aKZFeUQhL9a1kkOpVVaWnwAAAAc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aKZFeUQhL9a1kkOpVVaWnwAAAAc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[6] https://labs.watchtowr.com/guess-who-would-be-stupid-enough-to-rob-the-same-vault-twice-pre-auth-rce-chains-in-commvault/
[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aKZFeUQhL9a1kkOpVVaWnwAAAAc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[8] https://www.theregister.com/2025/06/05/llm_kept_persistent_path_traversal_bug_alive/
[9] https://www.theregister.com/2025/08/14/cisa_begs_ot_admins_to/
[10] https://www.theregister.com/2024/05/06/cisa_alert_dt_bugs/
[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aKZFeUQhL9a1kkOpVVaWnwAAAAc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[12] https://documentation.commvault.com/securityadvisories/CV_2025_08_3.html?ref=labs.watchtowr.com
[13] https://www.theregister.com/2025/05/13/patch_commvault_cvss_10/
[14] https://www.theregister.com/2025/07/21/massive_security_snafu_microsoft/
[15] https://www.theregister.com/2025/07/07/citrixbleed_2_exploits/
[16] https://www.theregister.com/2025/06/25/citrix_netscaler_critical_bug_exploited/
[17] https://www.theregister.com/2025/05/13/patch_commvault_cvss_10/
[18] https://documentation.commvault.com/securityadvisories/CV_2025_08_4.html?ref=labs.watchtowr.com
[19] https://whitepapers.theregister.com/
They reported the four vulnerabilities to Commvault in April, and the vendor released patches on Wednesday. Commvault SaaS is unaffected.
All users are advised to apply the available updates, especially since the first of the two chains works against all unpatched instances.
[1]
The first chain involves two vulnerabilities ( [2]CVE-2025-57791 and [3]CVE-2025-57790 ), an argument injection in CommServe and a path traversal bug respectively. The severity scores for the flaws are not especially concerning on their own, but chained together they become more dangerous.
[4]
[5]
In Commvault's advisory, it describes CVE-2025-57791 as a vulnerability that allows attackers to retrieve a valid user session for a low-privilege role, assigning it a CVSS score of 6.9 (medium severity).
In its [6]PoC , watchTowr painted a different view, showing how to gain access to a local admin account.
[7]
The argument injection bug at the heart of this chain lies in one of Commvault's QCommands. They're used to carry out admin functions, and their use is protected by requiring a valid API token.
QLogin is a QCommand that handles authentication, and researchers found that by altering fields in the request to the Login endpoint, they could bypass the need for a password and generate an API token for the local admin user.
The second vulnerability in the chain (CVE-2025-57790) carries the highest severity score of all four (8.7) that received patches today and is a [8]path traversal flaw, a bug class [9]CISA says [10]should have been eradicated long ago .
[11]
The researchers said an absolute path traversal in QCommand output writer allowed them to write a JSP webshell directly into the webroot, achieving RCE.
"This combination is exploitable against any unpatched Commvault instance," the researchers blogged. "We are not aware of preconditions or environmental limitations that would block it. It's as bad as it sounds, so we will not be publishing a Detection Artifact Generator for this one."
The second chain, which watchTowr concedes is dependent on specific but common conditions within a target's environment being met, also makes use of the same path traversal bug to ultimately achieve RCE, but does so after exploiting two additional, medium-severity flaws.
First, there's [12]CVE-2025-57788 , which allows unauthenticated users to call APIs to bypass authentication.
WatchTowr found that by sending a specially crafted request to the Commvault server, they could leak the password of the low-privileged _PublicSharingUser_ account via a returned JSON web token.
It carries a 6.9 severity score, and [13]Commvault says that role-based access control can help limit customers' exposure to the bug, but falls short of serving as a workaround.
[14]Another massive security snafu hits Microsoft, but don't expect it to stick
[15]CitrixBleed 2 exploits are on the loose as security researchers yell and wave their hands
[16]Citrix bleeds again: This time a zero-day exploited – patch now
[17]Commvault fixes critical Command Center issue after flaw finder alert
[18]CVE-2025-57789 comes after, and allows the attacker to gain admin access, and full control of the target system.
The bug bridges the gap between CVE-2025-57788 and CVE-2025-57790, which can't complete as a two-bug chain because the _PublicSharingUser_ account doesn't have the privileges to drop a webshell.
WatchTowr's Sonny and Piotr Bazydlo, who worked together on the research, found that the low-privileged account could retrieve user details, including password encryption keys for admin accounts.
They then found the method in Commvault's code used to decrypt passwords, and used it against the retrieved admin password to log in as that admin.
Notably, during watchTowr's version of the disclosure timeline, Commvault originally pushed back on this bug, saying it couldn't be feasibly exploited in real-world scenarios.
The vendor argued the flaw was impractical, which may explain why the make-me-admin bug carries the lowest severity score (5.3) of all four vulnerabilities, namely because of the conditions that highly limit the exploitability.
Note that the retrieved password was not hashed, but encrypted. This is only the case when the product is initially set up – the admin password set during this process is encrypted, but if it is ever changed, then it is hashed, making it more secure.
In addition, according to watchTowr, the day before it disclosed the flaw to Commvault, the backup vendor issued version 11.38.25, which introduced password hashing after the first successful login.
In response, watchTowr stood by its findings: "Even so, this chain will likely still impact many Commvault instances. And if it doesn't, the first chain we described remains unaffected by these limitations.
"It's also worth noting that many Commvault administrators don't use the built-in admin account at all, which could leave this attack path viable for longer."
The Register contacted Commvault for a response. ®
Get our [19]Tech Resources
[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aKZFeUQhL9a1kkOpVVaWnwAAAAc&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[2] https://documentation.commvault.com/securityadvisories/CV_2025_08_1.html?ref=labs.watchtowr.com
[3] https://documentation.commvault.com/securityadvisories/CV_2025_08_2.html?ref=labs.watchtowr.com
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aKZFeUQhL9a1kkOpVVaWnwAAAAc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aKZFeUQhL9a1kkOpVVaWnwAAAAc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[6] https://labs.watchtowr.com/guess-who-would-be-stupid-enough-to-rob-the-same-vault-twice-pre-auth-rce-chains-in-commvault/
[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aKZFeUQhL9a1kkOpVVaWnwAAAAc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[8] https://www.theregister.com/2025/06/05/llm_kept_persistent_path_traversal_bug_alive/
[9] https://www.theregister.com/2025/08/14/cisa_begs_ot_admins_to/
[10] https://www.theregister.com/2024/05/06/cisa_alert_dt_bugs/
[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aKZFeUQhL9a1kkOpVVaWnwAAAAc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[12] https://documentation.commvault.com/securityadvisories/CV_2025_08_3.html?ref=labs.watchtowr.com
[13] https://www.theregister.com/2025/05/13/patch_commvault_cvss_10/
[14] https://www.theregister.com/2025/07/21/massive_security_snafu_microsoft/
[15] https://www.theregister.com/2025/07/07/citrixbleed_2_exploits/
[16] https://www.theregister.com/2025/06/25/citrix_netscaler_critical_bug_exploited/
[17] https://www.theregister.com/2025/05/13/patch_commvault_cvss_10/
[18] https://documentation.commvault.com/securityadvisories/CV_2025_08_4.html?ref=labs.watchtowr.com
[19] https://whitepapers.theregister.com/