This vulnerability allows a Backup Administrator to perform remote code execution (RCE) as the postgres user by sending a malicious password parameter.
https://www.securityweek.com/several-code-execution-flaws-patched-in-veeam-backup-replication/
https://www.bleepingcomputer.com/news/security/new-veeam-vulnerabilities-expose-backup-servers-to-rce-attacks/
https://thehackernews.com/2026/01/veeam-patches-critical-rce.html
https://securityaffairs.com/186630/security/veeam-resolves-cvss-9-0-rce-flaw-and-other-security-issues.html
https://www.veeam.com/kb4792
Source: Mitre, NVD
Published: 2026-01-08
Updated: 2026-01-08
Base Score: 8
Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:P
Severity: High
Base Score: 9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Severity: Critical
EPSS: 0.00225