A vulnerability exists in the SecOps SOAR server. The custom integrations feature allowed an authenticated user with an "IDE role" to achieve Remote Code Execution (RCE) in the server. The flaw stemmed from weak validation of uploaded Python package code. An attacker could upload a package containing a malicious setup.py file, which would execute on the server during the installation process, leading to potential server compromise.
No customer action is required.
All customers have been automatically upgraded to the fixed version: 6.3.64 or higher.
References
| Link | Resource |
|---|---|
| https://cloud.google.com/support/bulletins#gcp-2025-075 | Vendor Advisory |
Configurations
History
03 Feb 2026, 19:24
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:google:security_operations_soar:*:*:*:*:*:*:*:* | |
| References | () https://cloud.google.com/support/bulletins#gcp-2025-075 - Vendor Advisory | |
| First Time |
Google
Google security Operations Soar |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
Information
Published : 2025-12-09 16:17
Updated : 2026-02-03 19:24
NVD link : CVE-2025-13428
Mitre link : CVE-2025-13428
CVE.ORG link : CVE-2025-13428
JSON object : View
Products Affected
- security_operations_soar
CWE
CWE-20
Improper Input Validation
