CVE-2025-48780

| EUVD-2025-17102 CRITICAL
2025-06-06 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17102
CVE Published
Jun 06, 2025 - 10:15 nvd
CRITICAL 9.8

Description

A deserialization of untrusted data vulnerability in the download file function of Soar Cloud HRD Human Resource Management System through version 7.3.2025.0408 allows remote attackers to execute arbitrary system commands via a crafted serialized object.

Analysis

Critical remote code execution vulnerability in Soar Cloud HRD Human Resource Management System (versions through 7.3.2025.0408) caused by unsafe deserialization of untrusted data in the download file function. An unauthenticated remote attacker can exploit this to execute arbitrary system commands with no user interaction required, achieving complete compromise of confidentiality, integrity, and availability. The CVSS 9.8 severity and network-accessible attack vector indicate this is a high-priority threat requiring immediate patching.

Technical Context

The vulnerability resides in CWE-502 (Deserialization of Untrusted Data), a class of flaw where applications deserialize serialized objects from untrusted sources without proper validation. In this case, the Soar Cloud HRD 'download file function' accepts serialized objects (likely Java serialized objects or similar binary formats) and deserializes them directly. An attacker crafts a malicious serialized object containing gadget chains (common Java deserialization gadgets from libraries like Apache Commons Collections, Spring Framework, or similar) that trigger arbitrary command execution during object instantiation. The affected product is Soar Cloud HRD (CPE context: enterprise HR management platform), which processes file downloads and likely uses a serialization framework for inter-component communication or state management. The lack of input validation or signature verification on serialized data allows the attack to succeed.

Affected Products

HRD Human Resource Management System (7.3.2025.0408 and earlier)

Priority Score

50
Low Medium High Critical
KEV: 0
EPSS: +0.6
CVSS: +49
POC: 0

Share

CVE-2025-48780 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy