CVE-2025-4613

8.8 HIGH

📋 TL;DR

A path traversal vulnerability in Google Web Designer allows attackers to achieve remote code execution by tricking users into opening malicious ad templates. This affects Windows users running versions prior to 16.3.0.0407. The vulnerability enables arbitrary file write and subsequent code execution.

💻 Affected Systems

Products:
  • Google Web Designer
Versions: All versions prior to 16.3.0.0407
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Requires user interaction to open malicious template file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the victim's Windows machine, potentially leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Local privilege escalation leading to malware installation, credential theft, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact if user runs with minimal privileges, but still potential for data exfiltration from user's accessible files and directories.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user to download and open a malicious template file. The vulnerability is client-side and requires social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.3.0.0407

Vendor Advisory: https://support.google.com/webdesigner/answer/14794789

Restart Required: Yes

Instructions:

1. Open Google Web Designer. 2. Click Help > Check for Updates. 3. Follow prompts to install version 16.3.0.0407 or later. 4. Restart the application.

🔧 Temporary Workarounds

Disable template downloads

windows

Prevent users from downloading or opening external template files

Run with restricted privileges

windows

Run Google Web Designer with limited user account privileges

🧯 If You Can't Patch

  • Immediately upgrade to version 16.3.0.0407 or later. There are no effective workarounds for this critical vulnerability.
  • Restrict user permissions and implement application whitelisting to prevent execution of unauthorized binaries.

🔍 How to Verify

Check if Vulnerable:

Check Google Web Designer version via Help > About. If version is below 16.3.0.0407, the system is vulnerable.

Check Version:

Not applicable - check via application GUI Help > About

Verify Fix Applied:

Verify version is 16.3.0.0407 or higher in Help > About dialog.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations in Windows Event Logs (Security/Application)
  • Google Web Designer process spawning unexpected child processes

Network Indicators:

  • Outbound connections from Google Web Designer process to unexpected destinations
  • Downloads of template files from untrusted sources

SIEM Query:

Process Creation where (Image contains 'GoogleWebDesigner.exe' AND CommandLine contains '.gtemplate') OR (ParentImage contains 'GoogleWebDesigner.exe' AND NOT Image contains expected_child_processes)

🔗 References

📤 Share & Export