CVE-2025-9571: CWE-502 Deserialization of Untrusted Data in Google Cloud Cloud Data Fusion
A remote code execution (RCE) vulnerability exists in Google Cloud Data Fusion. A user with permissions to upload artifacts to a Data Fusion instance can execute arbitrary code within the core AppFabric component. This could allow the attacker to gain control over the Data Fusion instance, potentially leading to unauthorized access to sensitive data, modification of data pipelines, and exploration of the underlying infrastructure. The following CDAP versions include the necessary update to protect against this vulnerability: * 6.10.6+ * 6.11.1+ Users must immediately upgrade to them, or greater ones, available at: https://github.com/cdapio/cdap-build/releases .
AI Analysis
Technical Summary
CVE-2025-9571 is a remote code execution vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting Google Cloud Data Fusion, a managed data integration service. The flaw exists within the core AppFabric component, which processes uploaded artifacts. A user with permissions to upload artifacts can craft malicious serialized data that, when deserialized by the system, triggers arbitrary code execution. This vulnerability does not require user interaction or elevated privileges beyond artifact upload rights, making it relatively easy to exploit in environments where such permissions are granted. Successful exploitation can lead to full compromise of the Data Fusion instance, allowing attackers to access sensitive data, alter or disrupt data pipelines, and potentially pivot to underlying infrastructure. The vulnerability affects versions before CDAP 6.10.6 and 6.11.1, with patches released on GitHub. The CVSS 4.0 score of 8.7 reflects high impact on confidentiality, integrity, and availability, combined with network attack vector and low attack complexity. No known exploits have been reported in the wild yet, but the threat is significant given the critical role of Data Fusion in cloud data workflows.
Potential Impact
For European organizations, this vulnerability poses a significant risk to data confidentiality, integrity, and availability within cloud data integration environments. Compromise of Data Fusion instances could lead to unauthorized exposure of sensitive or regulated data, violating GDPR and other data protection laws. Manipulation of data pipelines could disrupt business operations, corrupt analytics, or cause erroneous decision-making. Additionally, attackers gaining foothold in Data Fusion could explore and potentially escalate privileges within the broader cloud infrastructure, increasing the attack surface. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on Google Cloud Data Fusion for data processing are particularly at risk. The impact extends beyond data loss to reputational damage, regulatory penalties, and operational downtime.
Mitigation Recommendations
European organizations should immediately upgrade all Google Cloud Data Fusion instances to CDAP versions 6.10.6 or 6.11.1 or later to remediate this vulnerability. Review and restrict artifact upload permissions to the minimum necessary users, implementing strict access controls and monitoring. Employ network segmentation and zero-trust principles to limit exposure of Data Fusion instances. Enable detailed logging and anomaly detection to identify suspicious artifact uploads or unusual activity within Data Fusion. Conduct regular audits of user permissions and artifact repositories. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions that can detect and block exploitation attempts. Finally, maintain an incident response plan tailored to cloud service compromises to rapidly contain and remediate any breaches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-9571: CWE-502 Deserialization of Untrusted Data in Google Cloud Cloud Data Fusion
Description
A remote code execution (RCE) vulnerability exists in Google Cloud Data Fusion. A user with permissions to upload artifacts to a Data Fusion instance can execute arbitrary code within the core AppFabric component. This could allow the attacker to gain control over the Data Fusion instance, potentially leading to unauthorized access to sensitive data, modification of data pipelines, and exploration of the underlying infrastructure. The following CDAP versions include the necessary update to protect against this vulnerability: * 6.10.6+ * 6.11.1+ Users must immediately upgrade to them, or greater ones, available at: https://github.com/cdapio/cdap-build/releases .
AI-Powered Analysis
Technical Analysis
CVE-2025-9571 is a remote code execution vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting Google Cloud Data Fusion, a managed data integration service. The flaw exists within the core AppFabric component, which processes uploaded artifacts. A user with permissions to upload artifacts can craft malicious serialized data that, when deserialized by the system, triggers arbitrary code execution. This vulnerability does not require user interaction or elevated privileges beyond artifact upload rights, making it relatively easy to exploit in environments where such permissions are granted. Successful exploitation can lead to full compromise of the Data Fusion instance, allowing attackers to access sensitive data, alter or disrupt data pipelines, and potentially pivot to underlying infrastructure. The vulnerability affects versions before CDAP 6.10.6 and 6.11.1, with patches released on GitHub. The CVSS 4.0 score of 8.7 reflects high impact on confidentiality, integrity, and availability, combined with network attack vector and low attack complexity. No known exploits have been reported in the wild yet, but the threat is significant given the critical role of Data Fusion in cloud data workflows.
Potential Impact
For European organizations, this vulnerability poses a significant risk to data confidentiality, integrity, and availability within cloud data integration environments. Compromise of Data Fusion instances could lead to unauthorized exposure of sensitive or regulated data, violating GDPR and other data protection laws. Manipulation of data pipelines could disrupt business operations, corrupt analytics, or cause erroneous decision-making. Additionally, attackers gaining foothold in Data Fusion could explore and potentially escalate privileges within the broader cloud infrastructure, increasing the attack surface. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on Google Cloud Data Fusion for data processing are particularly at risk. The impact extends beyond data loss to reputational damage, regulatory penalties, and operational downtime.
Mitigation Recommendations
European organizations should immediately upgrade all Google Cloud Data Fusion instances to CDAP versions 6.10.6 or 6.11.1 or later to remediate this vulnerability. Review and restrict artifact upload permissions to the minimum necessary users, implementing strict access controls and monitoring. Employ network segmentation and zero-trust principles to limit exposure of Data Fusion instances. Enable detailed logging and anomaly detection to identify suspicious artifact uploads or unusual activity within Data Fusion. Conduct regular audits of user permissions and artifact repositories. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions that can detect and block exploitation attempts. Finally, maintain an incident response plan tailored to cloud service compromises to rapidly contain and remediate any breaches.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GoogleCloud
- Date Reserved
- 2025-08-28T08:14:06.716Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69391d0bed5c5e39c813c142
Added to database: 12/10/2025, 7:11:07 AM
Last enriched: 12/17/2025, 8:17:22 AM
Last updated: 2/5/2026, 2:46:47 AM
Views: 164
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumCVE-2026-1896: Improper Access Controls in WeKan
MediumCVE-2025-13192: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.