Cyber Posture

CVE-2025-0982

Critical

Published: 06 February 2025

Published
06 February 2025
Modified
30 July 2025
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0007 21.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Sandbox escape in the JavaScript Task feature of Google Cloud Application Integration allows an actor to execute arbitrary unsandboxed code via crafted JavaScript code executed by the Rhino engine. Effective January 24, 2025, Application Integration will no longer support Rhino as the JavaScript execution engine. No further fix actions are needed.

Security Summary

CVE-2025-0982 is a sandbox escape vulnerability in the JavaScript Task feature of Google Cloud Application Integration. The issue affects the Rhino JavaScript execution engine, where crafted JavaScript code can lead to the execution of arbitrary unsandboxed code. Published on 2025-02-06, it carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) and maps to CWE-829 (Inclusion of Functionality from Untrusted Control Sphere).

A remote attacker with no privileges can exploit this vulnerability over the network with low attack complexity and no user interaction. By providing specially crafted JavaScript code executed by the Rhino engine, the attacker achieves arbitrary code execution outside the sandbox, resulting in high confidentiality, integrity, and availability impacts due to the changed scope.

The release notes at https://cloud.google.com/application-integration/docs/release-notes#January_23_2025 state that effective January 24, 2025, Application Integration will no longer support Rhino as the JavaScript execution engine, rendering the vulnerability obsolete. No further mitigation actions are required.

Details

CWE(s)
CWE-829

Affected Products

google
application integration
≤ 2025-01-23

References