Impact
An improper access control flaw exists in several internal API endpoints of Google Cloud Application Integration that allow a remote, unauthenticated attacker to disclose sensitive internal information and execute arbitrary code via specially crafted HTTP requests. The weakness is identified as CWE-862, and the vulnerability carries a maximum CVSS score of 10.
Affected Systems
The affected vendor is Google Cloud, specifically the Internal Integration Platform APIs, with the issue present in versions released prior to 2026‑01‑23. No specific patch versions are listed, and the vulnerability is documented as a restriction to authenticated Google employees only.
Risk and Exploitability
The CVSS score of 10 signals the maximum potential impact, and the EPSS score is currently unavailable, suggesting no high exploitation probability has been published. Because the vulnerability is exploitable from the internet via unauthenticated HTTP requests, the risk is high for systems that inadvertently expose these internal endpoints. The lack of a KEV designation means it has not yet been reported as a known exploited vulnerability, but the severity alone warrants cautious monitoring.
OpenCVE Enrichment