Cyber Posture

CVE-2025-59468

CriticalRCE

Published: 08 January 2026

Published
08 January 2026
Modified
14 January 2026
KEV Added
Patch
CVSS Score 9.0 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
EPSS Score 0.0014 33.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-59468 is a critical-severity Command Injection (CWE-77) vulnerability in Veeam Veeam Backup \& Replication. Its CVSS base score is 9.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 33.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, reporting, and correction of the command injection flaw in Veeam PostgreSQL interactions, eliminating the vulnerability through patching.

prevent

Enforces validation of the malicious password parameter input to prevent command injection leading to RCE as the postgres user.

prevent

Limits the privileges of the Backup Administrator role and postgres user, reducing the impact of successful RCE exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Command injection (CWE-77) in Veeam PostgreSQL components enables remote code execution as postgres user, directly mapping to T1210 (Exploitation of Remote Services) and T1059 (Command and Scripting Interpreter).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

This vulnerability allows a Backup Administrator to perform remote code execution (RCE) as the postgres user by sending a malicious password parameter.

Deeper analysisAI

CVE-2025-59468 is a command injection vulnerability (CWE-77) that allows a Backup Administrator to achieve remote code execution (RCE) as the postgres user by supplying a malicious password parameter. Published on 2026-01-08, it carries a CVSS v3.1 base score of 9.0 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L), reflecting its critical severity due to network accessibility, low attack complexity, and significant impacts despite requiring high privileges. The vulnerability affects Veeam software components involving PostgreSQL interactions, as referenced in the vendor's knowledge base.

A Backup Administrator, possessing high-level privileges (PR:H), can exploit this flaw remotely over the network without user interaction. By crafting and sending a malicious password parameter, the attacker triggers command injection, resulting in RCE executed in the context of the postgres user. This yields high confidentiality and integrity impacts, a change in scope (S:C), and low availability disruption, potentially allowing unauthorized access to sensitive data or further system compromise within the affected environment.

Veeam has published mitigation guidance in knowledge base article KB4792 at https://www.veeam.com/kb4792, which security practitioners should consult for patching instructions, workarounds, and affected version details.

Details

CWE(s)

Affected Products

veeam
veeam backup \& replication
13.0.0.4967 — 13.0.1.1071

CVEs Like This One

CVE-2025-59470Same product: Veeam Veeam Backup \& Replication
CVE-2025-23120Same product: Veeam Veeam Backup \& Replication
CVE-2025-55125Same product: Veeam Veeam Backup \& Replication
CVE-2026-21671Same product: Veeam Veeam Backup \& Replication
CVE-2026-21666Same product: Veeam Veeam Backup \& Replication
CVE-2026-21667Same product: Veeam Veeam Backup \& Replication
CVE-2026-21669Same product: Veeam Veeam Backup \& Replication
CVE-2025-48983Same product: Veeam Veeam Backup \& Replication
CVE-2025-48984Same product: Veeam Veeam Backup \& Replication
CVE-2025-59469Same product: Veeam Veeam Backup \& Replication

References