No customer action is required.
All customers have been automatically upgraded to the fixed version: 6.3.64 or higher.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://cloud.google.com/support/bulletins#gcp-2025-075 |
|
Wed, 10 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google cloud Secops Soar Server |
|
| Vendors & Products |
Google
Google cloud Secops Soar Server |
Tue, 09 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in the SecOps SOAR server. The custom integrations feature allowed an authenticated user with an "IDE role" to achieve Remote Code Execution (RCE) in the server. The flaw stemmed from weak validation of uploaded Python package code. An attacker could upload a package containing a malicious setup.py file, which would execute on the server during the installation process, leading to potential server compromise. No customer action is required. All customers have been automatically upgraded to the fixed version: 6.3.64 or higher. | |
| Title | RCE in SecOps SOAR server via user-provided Python packages | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GoogleCloud
Published:
Updated: 2025-12-09T14:57:43.611Z
Reserved: 2025-11-19T16:11:12.098Z
Link: CVE-2025-13428
Updated: 2025-12-09T14:57:35.936Z
Status : Awaiting Analysis
Published: 2025-12-09T16:17:35.307
Modified: 2025-12-09T18:37:13.640
Link: CVE-2025-13428
No data.
OpenCVE Enrichment
Updated: 2025-12-10T17:52:28Z