CVE-2025-57790
Published: 20 August 2025
Summary
CVE-2025-57790 is a high-severity Absolute Path Traversal (CWE-36) vulnerability in Commvault Commvault. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 2.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents path traversal attacks by validating and sanitizing file path inputs to block unauthorized file system access.
Ensures timely identification, reporting, and patching of the specific path traversal vulnerability as detailed in the Commvault advisory.
Enforces logical access controls to restrict low-privilege users from unauthorized file system access despite path traversal attempts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in a remotely accessible Commvault component directly enables T1190 (Exploit Public-Facing Application) with subsequent high-impact file-system access and RCE potential.
NVD Description
A security vulnerability has been identified that allows remote attackers to perform unauthorized file system access through a path traversal issue. The vulnerability may lead to remote code execution.
Deeper analysisAI
CVE-2025-57790 is a path traversal vulnerability (CWE-36) in Commvault software that enables remote attackers to perform unauthorized file system access. This issue, published on 2025-08-20, carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential to escalate to remote code execution.
Attackers with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity and no user interaction required. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing unauthorized file system traversal and potential remote code execution on affected systems.
The Commvault security advisory at https://documentation.commvault.com/securityadvisories/CV_2025_08_2.html provides details on mitigation and patches for this vulnerability.
Details
- CWE(s)