Vulnerability Description
A vulnerability exists in the SecOps SOAR server. The custom integrations feature allowed an authenticated user with an "IDE role" to achieve Remote Code Execution (RCE) in the server. The flaw stemmed from weak validation of uploaded Python package code. An attacker could upload a package containing a malicious setup.py file, which would execute on the server during the installation process, leading to potential server compromise. No customer action is required. All customers have been automatically upgraded to the fixed version: 6.3.64 or higher.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Security Operations Soar | < 6.3.64 |
Related Weaknesses (CWE)
References
- https://cloud.google.com/support/bulletins#gcp-2025-075Vendor Advisory
FAQ
What is CVE-2025-13428?
CVE-2025-13428 is a vulnerability with a CVSS score of 7.2 (HIGH). A vulnerability exists in the SecOps SOAR server. The custom integrations feature allowed an authenticated user with an "IDE role" to achieve Remote Code Execution (RCE) in the server. The flaw stemme...
How severe is CVE-2025-13428?
CVE-2025-13428 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-13428?
Check the references section above for vendor advisories and patch information. Affected products include: Google Security Operations Soar.