This vulnerability allows a Backup Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
References
| Link | Resource |
|---|---|
| https://www.veeam.com/kb4792 | Vendor Advisory |
Configurations
History
14 Jan 2026, 20:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.veeam.com/kb4792 - Vendor Advisory | |
| CPE | cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:* | |
| First Time |
Veeam veeam Backup \& Replication
Veeam |
08 Jan 2026, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-77 |
08 Jan 2026, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-08 17:15
Updated : 2026-01-14 20:59
NVD link : CVE-2025-59470
Mitre link : CVE-2025-59470
CVE.ORG link : CVE-2025-59470
JSON object : View
Products Affected
veeam
- veeam_backup_\&_replication
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
