A Path Traversal vulnerability in the archive extraction component in Google SecOps SOAR Server (versions 6.3.54.0, 6.3.53.2, and all prior versions) allows an authenticated attacker with permissions to import Use Cases to achieve Remote Code Execution (RCE) via uploading a malicious ZIP archive containing path traversal sequences.
History

Fri, 12 Sep 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google cloud Platform
Google Cloud
Google Cloud secops Soar Server
Vendors & Products Google
Google cloud Platform
Google Cloud
Google Cloud secops Soar Server

Thu, 11 Sep 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Sep 2025 07:45:00 +0000

Type Values Removed Values Added
Description A Path Traversal vulnerability in the archive extraction component in Google SecOps SOAR Server (versions 6.3.54.0, 6.3.53.2, and all prior versions) allows an authenticated attacker with permissions to import Use Cases to achieve Remote Code Execution (RCE) via uploading a malicious ZIP archive containing path traversal sequences.
Title Zip Slip in Google SecOps SOAR allows for Remote Code Execution
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GoogleCloud

Published: 2025-09-11T07:37:50.010Z

Updated: 2025-09-11T12:28:15.397Z

Reserved: 2025-09-03T10:53:44.603Z

Link: CVE-2025-9918

cve-icon Vulnrichment

Updated: 2025-09-11T12:28:12.364Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-11T08:15:40.057

Modified: 2025-09-11T17:14:10.147

Link: CVE-2025-9918

cve-icon Redhat

No data.