CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
A deserialization of untrusted data vulnerability in the download file function of Soar Cloud HRD Human Resource Management System through version 7.3.2025.0408 allows remote attackers to execute arbitrary system commands via a crafted serialized object.
Analysis
Critical remote code execution vulnerability in Soar Cloud HRD Human Resource Management System (versions through 7.3.2025.0408) caused by unsafe deserialization of untrusted data in the download file function. An unauthenticated remote attacker can exploit this to execute arbitrary system commands with no user interaction required, achieving complete compromise of confidentiality, integrity, and availability. The CVSS 9.8 severity and network-accessible attack vector indicate this is a high-priority threat requiring immediate patching.
Technical Context
The vulnerability resides in CWE-502 (Deserialization of Untrusted Data), a class of flaw where applications deserialize serialized objects from untrusted sources without proper validation. In this case, the Soar Cloud HRD 'download file function' accepts serialized objects (likely Java serialized objects or similar binary formats) and deserializes them directly. An attacker crafts a malicious serialized object containing gadget chains (common Java deserialization gadgets from libraries like Apache Commons Collections, Spring Framework, or similar) that trigger arbitrary command execution during object instantiation. The affected product is Soar Cloud HRD (CPE context: enterprise HR management platform), which processes file downloads and likely uses a serialization framework for inter-component communication or state management. The lack of input validation or signature verification on serialized data allows the attack to succeed.
Affected Products
HRD Human Resource Management System (7.3.2025.0408 and earlier)
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17102