This vulnerability was patched on 26 January 2026, and no customer action is needed.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 03 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper authorization vulnerability in GitHub Trigger Comment Control in Google Cloud Build prior to 2026-1-26 allows a remote attacker to execute arbitrary code in the build environment. This vulnerability was patched on 26 January 2026, and no customer action is needed. | |
| Title | Google Cloud Build Comment Control Bypass | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GoogleCloud
Published:
Updated: 2026-03-03T16:38:21.141Z
Reserved: 2026-02-24T17:29:16.705Z
Link: CVE-2026-3136
Updated: 2026-03-03T16:38:14.528Z
Status : Received
Published: 2026-03-03T17:16:19.160
Modified: 2026-03-03T17:16:19.160
Link: CVE-2026-3136
No data.
OpenCVE Enrichment
No data.