CVE-2025-52732

Google · Google Multiple Products (specifically the "RealMag777 Google Map Targeting" component)

A high-severity vulnerability has been identified in multiple Google products, specifically within the Google Map Targeting component.

Executive summary

A high-severity vulnerability has been identified in multiple Google products, specifically within the Google Map Targeting component. This flaw, tracked as CVE-2025-52732, could allow an unauthenticated attacker to access and read sensitive files on the underlying server, potentially exposing credentials, configuration data, and other confidential information. Due to the high severity score (CVSS 8.8), immediate patching is required to prevent potential data breaches.

Vulnerability

This vulnerability is a Local File Inclusion (LFI). The application fails to properly sanitize user-supplied input that is used to construct a filename for a PHP include or require statement. An attacker can exploit this by crafting a malicious request containing path traversal sequences (e.g., ../) to navigate the server's file system. This would cause the application to include and potentially display the contents of arbitrary files, such as /etc/passwd, application source code, or configuration files containing sensitive credentials.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could lead to a significant data breach by allowing an attacker to exfiltrate sensitive information directly from the server. The potential consequences include the compromise of user data, theft of intellectual property, exposure of database credentials and API keys, and system configuration details. Such an incident could result in severe reputational damage, regulatory fines, and financial loss for the organization.

Remediation

Immediate Action: Organizations must apply the security updates provided by the vendor to all affected systems immediately. After patching, it is critical to monitor for any signs of post-remediation exploitation attempts and to conduct a thorough review of historical web server and application access logs for indicators of compromise.

Proactive Monitoring: Implement enhanced monitoring of web server logs, looking for suspicious requests containing path traversal characters (../, ..%2f, etc.) or attempts to access common sensitive system files (e.g., /etc/passwd, wp-config.php, .env). Web Application Firewall (WAF) and Intrusion Detection System (IDS) alerts related to Local File Inclusion attempts should be investigated with high priority.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with strict rules designed to detect and block LFI and path traversal attack patterns. Additionally, review and harden file system permissions on the web server to ensure the web service user account has read access only to the files it legitimately needs, restricting its ability to access sensitive system or configuration files.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 8.8) of this vulnerability and its presence in widely used Google products, we strongly recommend that organizations treat this as a critical priority. The risk of sensitive data exposure is significant. All affected systems should be patched immediately according to the vendor's advisory. While this vulnerability is not yet on the CISA KEV list, its severity warrants urgent action to prevent future exploitation.