Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3136: CWE-863 Incorrect Authorization (Permission Bypass) in Google Cloud Cloud Build

0
High
VulnerabilityCVE-2026-3136cvecve-2026-3136cwe-863
Published: Tue Mar 03 2026 (03/03/2026, 16:22:54 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Cloud Build

Description

An improper authorization vulnerability in GitHub Trigger Comment Control in Google Cloud Build prior to 2026-1-26 allows a remote attacker to execute arbitrary code in the build environment. This vulnerability was patched on 26 January 2026, and no customer action is needed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 17:25:09 UTC

Technical Analysis

CVE-2026-3136 is an improper authorization vulnerability classified under CWE-863, found in the GitHub Trigger Comment Control feature of Google Cloud Build. This vulnerability allows a remote attacker to bypass permission checks and execute arbitrary code within the build environment. The root cause is an incorrect authorization mechanism that fails to properly validate whether a user is permitted to trigger builds via GitHub comments. Since Cloud Build environments often have elevated privileges and access to sensitive code and deployment pipelines, arbitrary code execution here can lead to significant compromise. The vulnerability affects all versions prior to the patch released on January 26, 2026. Exploitation requires no prior authentication or privileges but does require user interaction, such as submitting a crafted comment on a GitHub repository linked to Cloud Build triggers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), user interaction required (UI:A), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). The scope is limited to the Cloud Build environment but can have cascading effects on the software supply chain. No known exploits have been reported in the wild as of the publication date. Google has patched the vulnerability, and customers are advised to update immediately to mitigate risk.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary code in the Cloud Build environment, potentially leading to full compromise of build pipelines. This can result in unauthorized access to source code, injection of malicious code into software builds, disruption of continuous integration/continuous deployment (CI/CD) workflows, and compromise of downstream production systems. The confidentiality of proprietary code and sensitive build artifacts is at risk, as is the integrity of software releases. Availability may also be impacted if attackers disrupt or halt build processes. Given the central role of Cloud Build in DevOps pipelines, exploitation could facilitate supply chain attacks, affecting a wide range of organizations relying on Google Cloud services. The ease of exploitation (no privileges required) and high impact make this a significant threat to organizations using Google Cloud Build, especially those with automated deployment pipelines and public GitHub repositories.

Mitigation Recommendations

Organizations should immediately verify that their Google Cloud Build environments have been updated with the patch released on January 26, 2026. Review and restrict GitHub trigger permissions to trusted users only, minimizing exposure to untrusted contributors. Implement monitoring and alerting on build triggers originating from GitHub comments to detect anomalous or unauthorized activity. Employ network segmentation and least privilege principles within build environments to limit the impact of potential code execution. Regularly audit build configurations and access controls for misconfigurations. Consider integrating additional verification steps in CI/CD pipelines, such as signed commits or multi-factor approval for triggering builds. Maintain up-to-date incident response plans that include supply chain attack scenarios. Finally, keep abreast of Google Cloud security advisories for any further updates or mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2026-02-24T17:29:16.705Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a70d52d1a09e29cb5a67e0

Added to database: 3/3/2026, 4:33:22 PM

Last enriched: 3/10/2026, 5:25:09 PM

Last updated: 4/18/2026, 1:15:15 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses