Palo Alto Networks Security Advisories / CVE-2025-2180

CVE-2025-2180 Checkov by Prisma Cloud: Unsafe Deserialization of Terraform Files Allows Code Execution

Urgency MODERATE

047910
Severity 1.1 · LOW
Exploit Maturity UNREPORTED
Response Effort MODERATE
Recovery USER
Value Density DIFFUSE
Attack Vector LOCAL
Attack Complexity LOW
Attack Requirements NONE
Automatable NO
User Interaction PASSIVE
Product Confidentiality NONE
Product Integrity LOW
Product Availability NONE
Privileges Required NONE
Subsequent Confidentiality LOW
Subsequent Integrity LOW
Subsequent Availability LOW

Description

An unsafe deserialization vulnerability in Palo Alto Networks Checkov by Prisma® Cloud allows an authenticated user to execute arbitrary code as a non administrative user by scanning a malicious terraform file when using Checkov in Prisma® Cloud.

This issue impacts Checkov 3.0 versions earlier than Checkov 3.2.415.

Product Status

VersionsAffectedUnaffected
Checkov by Prisma Cloud 3.2.0< 3.2.415>= 3.2.415

Required Configuration for Exposure

No special configuration is required to be vulnerable to this issue.

Severity: LOW, Suggested Urgency: MODERATE

If the user scans infrastructure as code (IaC) files from untrusted sources.
LOW - CVSS-BT: 1.1 /CVSS-B: 4.8 (CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L/E:U/AU:N/R:U/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-502 Deserialization of Untrusted Data

CAPEC-248 Command Injection

Solution

Version
Minor Version
Suggested Solution
Checkov by Prisma Cloud 3.2
3.2.0 through 3.2.414 Upgrade to 3.2.415 or later.

Workarounds and Mitigations

Do not run Checkov on terraform files from untrusted sources or pull requests.

Acknowledgments

Palo Alto Networks thanks Bryan Eastes for discovering and reporting this issue.

CPE Applicability

Timeline

Initial publication
© 2025 Palo Alto Networks, Inc. All rights reserved.