Cyber Posture

CVE-2025-59468

Critical

Published: 08 January 2026

Published
08 January 2026
Modified
14 January 2026
KEV Added
Patch
CVSS Score 9.0 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
EPSS Score 0.0012 30.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

This vulnerability allows a Backup Administrator to perform remote code execution (RCE) as the postgres user by sending a malicious password parameter.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, reporting, and correction of the command injection flaw in Veeam PostgreSQL interactions, eliminating the vulnerability through patching.

prevent

Enforces validation of the malicious password parameter input to prevent command injection leading to RCE as the postgres user.

prevent

Limits the privileges of the Backup Administrator role and postgres user, reducing the impact of successful RCE exploitation.

Security SummaryAI

CVE-2025-59468 is a command injection vulnerability (CWE-77) that allows a Backup Administrator to achieve remote code execution (RCE) as the postgres user by supplying a malicious password parameter. Published on 2026-01-08, it carries a CVSS v3.1 base score of 9.0 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L), reflecting its critical severity due to network accessibility, low attack complexity, and significant impacts despite requiring high privileges. The vulnerability affects Veeam software components involving PostgreSQL interactions, as referenced in the vendor's knowledge base.

A Backup Administrator, possessing high-level privileges (PR:H), can exploit this flaw remotely over the network without user interaction. By crafting and sending a malicious password parameter, the attacker triggers command injection, resulting in RCE executed in the context of the postgres user. This yields high confidentiality and integrity impacts, a change in scope (S:C), and low availability disruption, potentially allowing unauthorized access to sensitive data or further system compromise within the affected environment.

Veeam has published mitigation guidance in knowledge base article KB4792 at https://www.veeam.com/kb4792, which security practitioners should consult for patching instructions, workarounds, and affected version details.

Details

CWE(s)

Affected Products

veeam
veeam backup \& replication
13.0.0.4967 — 13.0.1.1071

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Command injection (CWE-77) in Veeam PostgreSQL components enables remote code execution as postgres user, directly mapping to T1210 (Exploitation of Remote Services) and T1059 (Command and Scripting Interpreter).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References