Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3136: CWE-863 Incorrect Authorization (Permission Bypass) in Google Cloud Cloud Build

0
High
VulnerabilityCVE-2026-3136cvecve-2026-3136cwe-863
Published: Tue Mar 03 2026 (03/03/2026, 16:22:54 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Cloud Build

Description

An improper authorization vulnerability in GitHub Trigger Comment Control in Google Cloud Build prior to 2026-1-26 allows a remote attacker to execute arbitrary code in the build environment. This vulnerability was patched on 26 January 2026, and no customer action is needed.

AI-Powered Analysis

AILast updated: 03/03/2026, 16:47:38 UTC

Technical Analysis

CVE-2026-3136 is an improper authorization vulnerability identified in the GitHub Trigger Comment Control feature of Google Cloud Build, a widely used continuous integration and delivery service. The vulnerability arises due to insufficient permission checks when processing GitHub comment triggers, allowing remote attackers to bypass authorization controls. This flaw enables attackers to execute arbitrary code within the build environment, potentially compromising the confidentiality, integrity, and availability of the build process and any artifacts produced. The vulnerability is classified under CWE-863, indicating a permission bypass due to incorrect authorization logic. Exploitation does not require any privileges (PR:N) or authentication (AT:N), but does require user interaction (UI:A), such as posting a specially crafted comment on a GitHub pull request or issue that triggers the build. The vulnerability has a CVSS 4.0 base score of 8.6, reflecting its high severity, with high impact on confidentiality, integrity, and availability, and low attack complexity. The scope is limited to Google Cloud Build environments using the vulnerable GitHub trigger feature prior to the patch date of January 26, 2026. Google has released a patch to address this issue, and no customer action is needed if the update is applied. No known exploits have been reported in the wild as of the publication date. This vulnerability poses a significant risk to organizations relying on automated build pipelines, as unauthorized code execution can lead to supply chain compromises, data leakage, or disruption of development workflows.

Potential Impact

The impact of CVE-2026-3136 is substantial for organizations using Google Cloud Build with GitHub Trigger Comment Control. Successful exploitation allows attackers to execute arbitrary code in the build environment without authentication, potentially leading to full compromise of the build pipeline. This can result in unauthorized access to sensitive source code, injection of malicious code into build artifacts, disruption of continuous integration and deployment processes, and potential downstream compromise of production environments. The vulnerability threatens confidentiality by exposing source code and build secrets, integrity by allowing tampering with build outputs, and availability by disrupting build operations. Given the central role of CI/CD pipelines in modern software development, this vulnerability could facilitate supply chain attacks, impacting software integrity on a broad scale. The ease of exploitation and lack of required privileges increase the risk profile, especially in organizations with automated build triggers linked to public or semi-public GitHub repositories. Although no exploits are currently known in the wild, the potential damage warrants urgent attention.

Mitigation Recommendations

To mitigate CVE-2026-3136, organizations should ensure that all Google Cloud Build environments are updated to the patched version released on or after January 26, 2026. Beyond applying the patch, organizations should implement strict access controls on GitHub repositories to limit who can post comments that trigger builds, reducing the attack surface. Review and restrict permissions for GitHub trigger comment controls to trusted users only. Implement monitoring and alerting on build triggers to detect unusual or unexpected build requests. Employ network segmentation and least privilege principles within build environments to limit the impact of potential code execution. Additionally, consider integrating manual approval steps for builds triggered by external comments, especially in public repositories. Regularly audit CI/CD pipeline configurations and logs for signs of unauthorized activity. Finally, maintain an incident response plan tailored to supply chain and build environment compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2026-02-24T17:29:16.705Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a70d52d1a09e29cb5a67e0

Added to database: 3/3/2026, 4:33:22 PM

Last enriched: 3/3/2026, 4:47:38 PM

Last updated: 3/4/2026, 2:41:28 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses