Project Subscriptions
No data.
No advisories yet.
Solution
These APIs were intended for internal Google use and access has been restricted to only authenticated Google employees. No action is required from external users.
Workaround
No workaround given by the vendor.
Fri, 15 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Access Control vulnerability in several internal API endpoints for Google Cloud Application Integration prior to 2026-01-23 allows a remote, unauthenticated attacker to disclose sensitive internal information and execute arbitrary code using specially crafted HTTP requests to inadvertently exposed internal API endpoints. | |
| Title | Google Cloud Application Integration: Exposed internal APIs allow Information Disclosure and Remote Code Execution. | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GoogleCloud
Published:
Updated: 2026-05-15T16:11:44.918Z
Reserved: 2026-02-05T22:49:59.398Z
Link: CVE-2026-2031
Updated: 2026-05-15T16:11:40.824Z
Status : Received
Published: 2026-05-15T16:16:14.027
Modified: 2026-05-15T16:16:14.027
Link: CVE-2026-2031
No data.
OpenCVE Enrichment
No data.