Description
A Code Injection and Missing Authentication vulnerability in Google Agent Development Kit (ADK) versions 1.7.0 (and 2.0.0a1) through 1.28.1 (and 2.0.0a2) on Python (OSS), Cloud Run, and GKE allows an unauthenticated remote attacker to execute arbitrary code on the server hosting the ADK instance.

This vulnerability was patched in versions 1.28.1 and 2.0.0a2.


Customers need to redeploy the upgraded ADK to their production environments. In addition, if they are running ADK Web locally, they also need to upgrade their local instance.
Published: 2026-04-13
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate Patch
AI Analysis

Impact

A code injection flaw combined with missing authentication allows an unauthenticated user to run arbitrary code on any server hosting the Google Agent Development Kit (ADK). The vulnerability, classified as CWE-306, means attackers can gain full control over the ADK instance, leading to compromise of confidentiality, integrity, and availability of the affected environment.

Affected Systems

Google Cloud’s Agent Development Kit (ADK) is affected. Vulnerable versions include 1.7.0 through 1.28.1 and 2.0.0a1 through 2.0.0a2. The flaw exists in Python (OSS) deployments, as well as when ADK is run on Cloud Run or GKE. Local installations of ADK Web are also impacted if they have not been upgraded.

Risk and Exploitability

The CVSS base score is 9.3, indicating a critical vulnerability. Although EPSS data is not available and the issue has not yet appeared in CISA’s KEV catalog, the lack of authentication combined with remote code execution capability means exploitation would be straightforward if the ADK service is exposed. Immediate patching is strongly recommended to mitigate the high risk of compromise.

Generated by OpenCVE AI on April 13, 2026 at 10:20 UTC.

Remediation

Vendor Solution

Customers need to redeploy the ADK to version 1.28.1 (or 2.0.0a2) or later to receive the fix on their production environments. In addition, if they are running ADK Web locally, they also need to upgrade their local instance.


OpenCVE Recommended Actions

  • Deploy ADK versions 1.28.1 or later (or 2.0.0a2 or later) to all production environments.
  • Upgrade any locally running ADK Web instance to a patched version.
  • Verify that no older, vulnerable ADK instances remain active in the environment.
  • Implement network segmentation or firewall rules to restrict external access to ADK services.
  • Monitor logs and network activity for signs of unauthorized code execution attempts.

Generated by OpenCVE AI on April 13, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Google Cloud
Google Cloud agent Development Kit (adk)
Vendors & Products Google Cloud
Google Cloud agent Development Kit (adk)

Mon, 13 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description A Code Injection and Missing Authentication vulnerability in Google Agent Development Kit (ADK) versions 1.7.0 (and 2.0.0a1) through 1.28.1 (and 2.0.0a2) on Python (OSS), Cloud Run, and GKE allows an unauthenticated remote attacker to execute arbitrary code on the server hosting the ADK instance. This vulnerability was patched in versions 1.28.1 and 2.0.0a2. Customers need to redeploy the upgraded ADK to their production environments. In addition, if they are running ADK Web locally, they also need to upgrade their local instance.
Title Remote Code Execution in Google Agent Development Kit (ADK)
Weaknesses CWE-306
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/U:Amber'}


Subscriptions

Google Cloud Agent Development Kit (adk)
cve-icon MITRE

Status: PUBLISHED

Assigner: GoogleCloud

Published:

Updated: 2026-04-13T13:07:12.959Z

Reserved: 2026-03-25T12:55:06.694Z

Link: CVE-2026-4810

cve-icon Vulnrichment

Updated: 2026-04-13T13:07:09.469Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-13T09:16:08.883

Modified: 2026-04-13T15:01:43.663

Link: CVE-2026-4810

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:52:34Z

Weaknesses