CVE-2026-3136

Plain English Summary

AI-powered analysis for quick understanding

A remote attacker could execute arbitrary code in the build environment of Google Cloud Build due to improper authorization in the GitHub Trigger Comment Control feature. This vulnerability affected versions released before January 26, 2026, but it has since been patched, so no action is needed from users.

Technical Description

An improper authorization vulnerability in GitHub Trigger Comment Control in Google Cloud Build prior to 2026-1-26 allows a remote attacker to execute arbitrary code in the build environment. This vulnerability was patched on 26 January 2026, and no customer action is needed.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Clear

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,368($1K-$5K)
Vendor Response
Grade APatched in 2 days

Quick Information

Published

Mar 3, 2026

about 1 month ago

Last Modified

Mar 5, 2026

about 1 month ago

Vendor

google

Product

cloud build