Home

Description

The Report Builder component of the application stores user input directly in a web page and displays it to other users, which raised concerns about a possible Cross-Site Scripting (XSS) attack. Proper management of this functionality helps ensure a secure and seamless user experience. Although the user input is not validated in the report creation, these scripts are not executed when the report is run by end users. The script is executed when the report is modified through the report builder by a user with edit permissions. The Report Builder is part of the WebConsole. The WebConsole package is currently end of life, and is no longer maintained. We strongly recommend against installing or using it in any production environment. However, if you choose to install it, for example, to access functionality like the Report Builder, it must be deployed within a fully isolated network that has no access to sensitive data or internet connectivity. This is a critical security precaution, as the retired package may contain unpatched vulnerabilities and is no longer supported with updates or fixes.

PUBLISHED Reserved 2025-11-05 | Published 2026-01-07 | Updated 2026-01-08 | Assigner Commvault




LOW: 1.8CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

11.32.0 (semver)
affected

11.36.0 (semver)
affected

11.40.1 (semver)
unaffected

11.42.1 (semver)
unaffected

Credits

NCIA researchers finder

References

documentation.commvault.com/...yadvisories/CV_2025_06_3.html

cve.org (CVE-2025-12776)

nvd.nist.gov (CVE-2025-12776)

Download JSON