CVE-2026-2031 PUBLISHED

Google Cloud Application Integration: Exposed internal APIs allow Information Disclosure and Remote Code Execution.

Assigner: GoogleCloud
Reserved: 05.02.2026 Published: 15.05.2026 Updated: 15.05.2026

An Improper Access Control vulnerability in several internal API endpoints for Google Cloud Application Integration prior to 2026-01-23 allows a remote, unauthenticated attacker to disclose sensitive internal information and execute arbitrary code using specially crafted HTTP requests to inadvertently exposed internal API endpoints.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/U:Clear
CVSS Score: 10

Product Status

Vendor Google Cloud
Product Internal Integration Platform APIs
Versions Default: unaffected
  • affected from 0 to 2026-01-23 (excl.)

Solutions

These APIs were intended for internal Google use and access has been restricted to only authenticated Google employees.

No action is required from external users.

Credits

  • Arvin Shivram reporter

References

Problem Types

  • CWE-862 Missing Authorization CWE

Impacts

  • CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs