An unsafe deserialization vulnerability in Palo Alto Networks Checkov by Prisma® Cloud allows an authenticated user to execute arbitrary code as a non administrative user by scanning a malicious terraform file when using Checkov in Prisma® Cloud.

This issue impacts Checkov 3.0 versions earlier than Checkov 3.2.415.
Fixes

Solution

No solution given by the vendor.


Workaround

Do not run Checkov on terraform files from untrusted sources or pull requests.

History

Fri, 15 Aug 2025 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Paloaltonetworks
Paloaltonetworks checkov
Vendors & Products Paloaltonetworks
Paloaltonetworks checkov

Wed, 13 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Aug 2025 17:15:00 +0000

Type Values Removed Values Added
Description An unsafe deserialization vulnerability in Palo Alto Networks Checkov by Prisma® Cloud allows an authenticated user to execute arbitrary code as a non administrative user by scanning a malicious terraform file when using Checkov in Prisma® Cloud. This issue impacts Checkov 3.0 versions earlier than Checkov 3.2.415.
Title Checkov by Prisma Cloud: Unsafe Deserialization of Terraform Files Allows Code Execution
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L/AU:N/R:U/V:D/RE:M/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2025-08-13T17:21:30.216Z

Reserved: 2025-03-10T17:56:22.502Z

Link: CVE-2025-2180

cve-icon Vulnrichment

Updated: 2025-08-13T17:21:25.289Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-13T17:15:25.973

Modified: 2025-08-13T17:33:46.673

Link: CVE-2025-2180

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-14T12:59:57Z