A Path Traversal vulnerability in the archive extraction component in Google SecOps SOAR Server (versions 6.3.54.0, 6.3.53.2, and all prior versions) allows an authenticated attacker with permissions to import Use Cases to achieve Remote Code Execution (RCE) via uploading a malicious ZIP archive containing path traversal sequences.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 11 Sep 2025 07:45:00 +0000

Type Values Removed Values Added
Description A Path Traversal vulnerability in the archive extraction component in Google SecOps SOAR Server (versions 6.3.54.0, 6.3.53.2, and all prior versions) allows an authenticated attacker with permissions to import Use Cases to achieve Remote Code Execution (RCE) via uploading a malicious ZIP archive containing path traversal sequences.
Title Zip Slip in Google SecOps SOAR allows for Remote Code Execution
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GoogleCloud

Published:

Updated: 2025-09-11T07:37:50.010Z

Reserved: 2025-09-03T10:53:44.603Z

Link: CVE-2025-9918

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-11T08:15:40.057

Modified: 2025-09-11T08:15:40.057

Link: CVE-2025-9918

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.