An Improper Access Control vulnerability in several internal API endpoints for Google Cloud Application Integration prior to 2026-01-23 allows a remote, unauthenticated attacker to disclose sensitive internal information and execute arbitrary code using specially crafted HTTP requests to inadvertently exposed internal API endpoints.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

These APIs were intended for internal Google use and access has been restricted to only authenticated Google employees. No action is required from external users.


Workaround

No workaround given by the vendor.

History

Fri, 15 May 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 May 2026 16:00:00 +0000

Type Values Removed Values Added
Description An Improper Access Control vulnerability in several internal API endpoints for Google Cloud Application Integration prior to 2026-01-23 allows a remote, unauthenticated attacker to disclose sensitive internal information and execute arbitrary code using specially crafted HTTP requests to inadvertently exposed internal API endpoints.
Title Google Cloud Application Integration: Exposed internal APIs allow Information Disclosure and Remote Code Execution.
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/U:Clear'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GoogleCloud

Published:

Updated: 2026-05-15T16:11:44.918Z

Reserved: 2026-02-05T22:49:59.398Z

Link: CVE-2026-2031

cve-icon Vulnrichment

Updated: 2026-05-15T16:11:40.824Z

cve-icon NVD

Status : Received

Published: 2026-05-15T16:16:14.027

Modified: 2026-05-15T16:16:14.027

Link: CVE-2026-2031

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses