This vulnerability allows a Backup Administrator to perform remote code execution (RCE) as the postgres user by sending a
malicious password parameter.
References
| Link | Resource |
|---|---|
| https://www.veeam.com/kb4792 | Vendor Advisory |
Configurations
History
14 Jan 2026, 20:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.veeam.com/kb4792 - Vendor Advisory | |
| CPE | cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:* | |
| First Time |
Veeam veeam Backup \& Replication
Veeam |
08 Jan 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-77 |
08 Jan 2026, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-08 17:15
Updated : 2026-01-14 20:58
NVD link : CVE-2025-59468
Mitre link : CVE-2025-59468
CVE.ORG link : CVE-2025-59468
JSON object : View
Products Affected
veeam
- veeam_backup_\&_replication
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
