6.5 CVE-2025-57788
Exploit
A vulnerability in a known login mechanism allows unauthenticated attackers to execute API calls without requiring user credentials. RBAC helps limit the exposure but does not eliminate risk.
https://nvd.nist.gov/vuln/detail/CVE-2025-57788
Categories
CWE-259
References
050066fd-a2f9-4f32-ab5d-4c53f48bc333
134c704f-9b21-4f2e-91b3-4a467353bcc0 Exploit
| https://labs.watchtowr.com/guess-who-would-be-stupid-enough-to-rob-the-same-v... Exploit Third Party Advisory |
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:commvault:commvault:*:*:*:*:*:*:*:* | < 11.36.60 | |
REMEDIATION
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
Other Nist (github, ...)
| Url |
|---|
| https://labs.watchtowr.com/guess-who-would-be-stupid-enough-to-rob-the-same-v... |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
