Description
A Generation of Error Message Containing Sensitive Information vulnerability in the Materialized View Refresh mechanism in Google BigQuery on Google Cloud Platform allows an authenticated user to potentially disclose sensitive data using a crafted materialized view that triggers a runtime error during the refresh process.

This vulnerability was patched on 29 January 2026, and no customer action is needed.
Published: 2026-04-23
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive data disclosure via error messages in BigQuery materialized view refresh
Action: No action required
AI Analysis

Impact

This vulnerability involves an unintentional exposure of confidential data when a materialized view refresh in Google BigQuery generates an error message that contains sensitive information. An attacker who is able to create and run a crafted materialized view can trigger a runtime error and receive an error report that leaks data from the underlying query. The flaw is classified as a high severity information disclosure problem and is mapped to the Common Weakness Enumeration CWE‑209, which covers data exposure through error messages. Because the error can contain tenant‑specific data, any authenticated request that causes the error is capable of revealing secrets within the project’s data set.

Affected Systems

The affected product is Google Cloud BigQuery. The vulnerability was addressed in an update released on 29 January 2026. Users running a version of BigQuery that predates this update—i.e., any instance that is still on a date before 29 January 2026—may be susceptible. No specific sub‑versions were enumerated, so all pre‑29 January releases should be examined.

Risk and Exploitability

The CVSS score of 7.1 places the issue in the high severity band, whereas the EPSS score indicates that exploitation is unlikely (less than 1% probability). The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Because the flaw requires authenticated access to generate the malicious view, it is effectively an insider or compromised‑credential scenario rather than a public threat. An attacker would need to have the privilege to create or modify materialized views and trigger a refresh, after which the leaking error message would be returned to the attacker. Provided current logging and monitoring, the risk of accidental disclosure can be mitigated even if the vulnerability were present.

Generated by OpenCVE AI on April 29, 2026 at 01:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Inventory all materialized view definitions and modify or drop any that could provoke sensitive error messages.
  • Limit permission to refresh materialized views to the minimum set of users required for business operations.
  • Configure CloudAudit logs to flag error messages containing potentially sensitive data and restrict log access to authorized personnel.

Generated by OpenCVE AI on April 29, 2026 at 01:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Google Cloud
Google Cloud bigquery
Vendors & Products Google Cloud
Google Cloud bigquery

Thu, 23 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Description A Generation of Error Message Containing Sensitive Information vulnerability in the Materialized View Refresh mechanism in Google BigQuery on Google Cloud Platform allows an authenticated user to potentially disclose sensitive data using a crafted materialized view that triggers a runtime error during the refresh process. This vulnerability was patched on 29 January 2026, and no customer action is needed.
Title Sensitive Data Disclosure in BigQuery via Materialized View Error Messages
Weaknesses CWE-209
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/U:Clear'}


Subscriptions

Google Cloud Bigquery
cve-icon MITRE

Status: PUBLISHED

Assigner: GoogleCloud

Published:

Updated: 2026-04-30T15:21:26.856Z

Reserved: 2026-02-26T14:21:42.934Z

Link: CVE-2026-3259

cve-icon Vulnrichment

Updated: 2026-04-23T12:34:14.415Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-23T10:16:16.610

Modified: 2026-04-24T14:50:56.203

Link: CVE-2026-3259

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T01:45:26Z

Weaknesses