An improper authorization vulnerability in GitHub Trigger Comment Control in Google Cloud Build prior to 2026-1-26 allows a remote attacker to execute arbitrary code in the build environment.

This vulnerability was patched on 26 January 2026, and no customer action is needed.

Project Subscriptions

Vendors Products
Google Cloud Subscribe
Cloud Build Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 04 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Google Cloud
Google Cloud cloud Build
Vendors & Products Google Cloud
Google Cloud cloud Build

Tue, 03 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description An improper authorization vulnerability in GitHub Trigger Comment Control in Google Cloud Build prior to 2026-1-26 allows a remote attacker to execute arbitrary code in the build environment. This vulnerability was patched on 26 January 2026, and no customer action is needed.
Title Google Cloud Build Comment Control Bypass
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/U:Clear'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GoogleCloud

Published:

Updated: 2026-03-04T04:55:36.155Z

Reserved: 2026-02-24T17:29:16.705Z

Link: CVE-2026-3136

cve-icon Vulnrichment

Updated: 2026-03-03T16:38:14.528Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-03T17:16:19.160

Modified: 2026-03-03T21:52:29.877

Link: CVE-2026-3136

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-04T14:54:13Z

Weaknesses