malicious password parameter.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.veeam.com/kb4792 |
|
Thu, 08 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
ssvc
|
Thu, 08 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability allows a Backup Administrator to perform remote code execution (RCE) as the postgres user by sending a malicious password parameter. | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2026-01-09T04:55:23.362Z
Reserved: 2025-09-16T15:00:07.876Z
Link: CVE-2025-59468
Updated: 2026-01-08T20:10:34.046Z
Status : Awaiting Analysis
Published: 2026-01-08T17:15:48.067
Modified: 2026-01-08T20:15:43.817
Link: CVE-2025-59468
No data.
OpenCVE Enrichment
No data.