This vulnerability was patched on 26 January 2026, and no customer action is needed.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 04 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google Cloud
Google Cloud cloud Build |
|
| Vendors & Products |
Google Cloud
Google Cloud cloud Build |
Tue, 03 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper authorization vulnerability in GitHub Trigger Comment Control in Google Cloud Build prior to 2026-1-26 allows a remote attacker to execute arbitrary code in the build environment. This vulnerability was patched on 26 January 2026, and no customer action is needed. | |
| Title | Google Cloud Build Comment Control Bypass | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GoogleCloud
Published:
Updated: 2026-03-04T04:55:36.155Z
Reserved: 2026-02-24T17:29:16.705Z
Link: CVE-2026-3136
Updated: 2026-03-03T16:38:14.528Z
Status : Awaiting Analysis
Published: 2026-03-03T17:16:19.160
Modified: 2026-03-03T21:52:29.877
Link: CVE-2026-3136
No data.
OpenCVE Enrichment
Updated: 2026-03-04T14:54:13Z