A Path Traversal vulnerability in the archive extraction component in Google SecOps SOAR Server (versions 6.3.54.0, 6.3.53.2, and all prior versions) allows an authenticated attacker with permissions to import Use Cases to achieve Remote Code Execution (RCE) via uploading a malicious ZIP archive containing path traversal sequences.
Metrics
Affected Vendors & Products
References
History
Fri, 12 Sep 2025 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google cloud Platform Google Cloud Google Cloud secops Soar Server |
|
Vendors & Products |
Google
Google cloud Platform Google Cloud Google Cloud secops Soar Server |
Thu, 11 Sep 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 11 Sep 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Path Traversal vulnerability in the archive extraction component in Google SecOps SOAR Server (versions 6.3.54.0, 6.3.53.2, and all prior versions) allows an authenticated attacker with permissions to import Use Cases to achieve Remote Code Execution (RCE) via uploading a malicious ZIP archive containing path traversal sequences. | |
Title | Zip Slip in Google SecOps SOAR allows for Remote Code Execution | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GoogleCloud
Published: 2025-09-11T07:37:50.010Z
Updated: 2025-09-11T12:28:15.397Z
Reserved: 2025-09-03T10:53:44.603Z
Link: CVE-2025-9918

Updated: 2025-09-11T12:28:12.364Z

Status : Awaiting Analysis
Published: 2025-09-11T08:15:40.057
Modified: 2025-09-11T17:14:10.147
Link: CVE-2025-9918

No data.