CVE-2025-0982

Sandbox escape in the JavaScript Task feature of Google Cloud Application Integration allows an actor to execute arbitrary unsandboxed code via crafted JavaScript code executed by the Rhino engine. Effective January 24, 2025, Application Integration will no longer support Rhino as the JavaScript execution engine. No further fix actions are needed.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:application_integration:*:*:*:*:*:*:*:*

History

30 Jul 2025, 18:14

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 10.0
First Time Google application Integration
Google
CPE cpe:2.3:a:google:application_integration:*:*:*:*:*:*:*:*
Summary
  • (es) El escape de la sandbox en la función de tareas de JavaScript de Google Cloud Application Integration permite que un actor ejecute código arbitrario de la sandbox a través de código JavaScript manipulado por el motor Rhino. A partir del 24 de enero de 2025, Application Integration ya no admitirá Rhino como motor de ejecución de JavaScript. No se necesitan más acciones de corrección.
References () https://cloud.google.com/application-integration/docs/release-notes#January_23_2025 - () https://cloud.google.com/application-integration/docs/release-notes#January_23_2025 - Release Notes

06 Feb 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-06 12:15

Updated : 2025-07-30 18:14


NVD link : CVE-2025-0982

Mitre link : CVE-2025-0982

CVE.ORG link : CVE-2025-0982


JSON object : View

Products Affected

google

  • application_integration
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere