Skip to main content

CVE-2025-9918: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Google Cloud Google SecOps SOAR

High
VulnerabilityCVE-2025-9918cvecve-2025-9918cwe-22
Published: Thu Sep 11 2025 (09/11/2025, 07:37:50 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Google SecOps SOAR

Description

A Path Traversal vulnerability in the archive extraction component in Google SecOps SOAR Server (versions 6.3.54.0, 6.3.53.2, and all prior versions) allows an authenticated attacker with permissions to import Use Cases to achieve Remote Code Execution (RCE) via uploading a malicious ZIP archive containing path traversal sequences.

AI-Powered Analysis

AILast updated: 09/11/2025, 12:32:12 UTC

Technical Analysis

CVE-2025-9918 is a critical path traversal vulnerability identified in the archive extraction component of Google Cloud's SecOps SOAR Server, affecting versions 6.3.54.0, 6.3.53.2, and all prior releases. This vulnerability arises from improper limitation of pathname inputs (CWE-22), allowing an authenticated attacker with permissions to import Use Cases to craft and upload a malicious ZIP archive containing path traversal sequences (e.g., '../') that bypass directory restrictions during extraction. Exploiting this flaw enables the attacker to write files outside the intended extraction directory, potentially overwriting critical system or application files. This can lead to Remote Code Execution (RCE) without requiring user interaction or elevated privileges beyond import permissions. The CVSS 4.0 base score is 8.7 (high severity), reflecting network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability's exploitation scope is limited to authenticated users with import rights, but given the nature of SOAR platforms—used for security orchestration and automation—compromise can have severe consequences, including full system takeover and disruption of security operations. No known exploits are currently reported in the wild, and no patches have been linked yet, emphasizing the need for immediate attention from affected organizations.

Potential Impact

For European organizations, the impact of CVE-2025-9918 is significant due to the critical role SOAR platforms play in automating incident response and managing security workflows. Successful exploitation could allow attackers to execute arbitrary code on SOAR servers, potentially compromising sensitive security data, disrupting automated defense mechanisms, and enabling lateral movement within networks. This could lead to data breaches, operational downtime, and erosion of trust in security infrastructure. Given the GDPR and other stringent data protection regulations in Europe, such a compromise could also result in regulatory penalties and reputational damage. Organizations relying on Google SecOps SOAR for centralized security operations, especially in sectors like finance, healthcare, and critical infrastructure, face heightened risk. The requirement for authenticated access somewhat limits exposure but does not eliminate risk, as insider threats or compromised credentials could be leveraged. The absence of known exploits provides a window for proactive mitigation but also necessitates urgent patching once available.

Mitigation Recommendations

European organizations should immediately audit and restrict import Use Case permissions to trusted administrators only, minimizing the attack surface. Implement strict access controls and multi-factor authentication (MFA) for all users with import privileges to reduce the risk of credential compromise. Monitor logs for unusual ZIP archive uploads or extraction errors indicative of path traversal attempts. Until a patch is released, consider disabling the import functionality if feasible or isolating the SOAR server in a segmented network zone with limited access. Employ file integrity monitoring on the SOAR server to detect unauthorized file changes. Engage with Google Cloud support for updates on patches or workarounds and apply them promptly upon release. Additionally, conduct regular security awareness training to prevent insider threats and credential misuse. Finally, integrate vulnerability scanning and penetration testing focused on SOAR components to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GoogleCloud
Date Reserved
2025-09-03T10:53:44.603Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c2c12d5fab504ad85bc105

Added to database: 9/11/2025, 12:31:41 PM

Last enriched: 9/11/2025, 12:32:12 PM

Last updated: 9/11/2025, 1:03:48 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats