CVE-2026-3136
Plain English Summary
AI-powered analysis for quick understanding
A remote attacker could execute arbitrary code in the build environment of Google Cloud Build due to improper authorization in the GitHub Trigger Comment Control feature. This vulnerability affected versions released before January 26, 2026, but it has since been patched, so no action is needed from users.
Technical Description
An improper authorization vulnerability in GitHub Trigger Comment Control in Google Cloud Build prior to 2026-1-26 allows a remote attacker to execute arbitrary code in the build environment. This vulnerability was patched on 26 January 2026, and no customer action is needed.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:ClearExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 3, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
Product
cloud build
Related Vulnerabilities
This vulnerability allows an attacker to remotely crash an Android device without needing special permissions. It occurs due to a failure to properly check input in the nr modem, which means that simply sending the right kind of data can disrupt the device's operation.
This vulnerability allows an attacker to crash an Android device remotely, causing it to stop working properly. It requires no special permissions, meaning anyone can exploit it without needing to be logged in or have access to the device.
This vulnerability allows an attacker to crash an Android device remotely, causing it to become unresponsive. It requires no special permissions, meaning anyone can exploit it simply by sending the right input to the device's modem.
This vulnerability allows an attacker to crash an Android device remotely, causing it to stop working properly. It can happen without needing any special permissions, simply by sending the device improper data.
This vulnerability allows an attacker to remotely crash an Android device without needing special permissions, effectively causing a denial of service. It occurs due to the device not properly checking the input it receives, which can be exploited under certain conditions.