A privilege escalation vulnerability exists in Google Cloud's Dialogflow CX.

Dialogflow agent developers with Webhook editor permission are able to configure Webhooks using Dialogflow service agent access token authentication.
This allows the attacker to escalate their privileges from agent-level to project-level, granting them unauthorized access to manage resources in services associated with the project, leading to unexpected costs and resource depletion for the producer project.

A fix was applied on the server side to protect from this vulnerability in February 2025. No customer action is required.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google cloud Dialogflow Cx
Vendors & Products Google
Google cloud Dialogflow Cx

Wed, 10 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 07:30:00 +0000

Type Values Removed Values Added
Description A privilege escalation vulnerability exists in Google Cloud's Dialogflow CX. Dialogflow agent developers with Webhook editor permission are able to configure Webhooks using Dialogflow service agent access token authentication. This allows the attacker to escalate their privileges from agent-level to project-level, granting them unauthorized access to manage resources in services associated with the project, leading to unexpected costs and resource depletion for the producer project. A fix was applied on the server side to protect from this vulnerability in February 2025. No customer action is required.
Title Privilege Escalation in Dialogflow CX via Webhook Admin Role
Weaknesses CWE-269
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/U:Clear'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GoogleCloud

Published:

Updated: 2025-12-10T15:05:59.003Z

Reserved: 2025-11-10T13:42:45.771Z

Link: CVE-2025-12952

cve-icon Vulnrichment

Updated: 2025-12-10T15:05:49.031Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-10T08:16:02.637

Modified: 2025-12-12T15:18:42.140

Link: CVE-2025-12952

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-10T17:48:50Z

Weaknesses