CVE-2026-7428 PUBLISHED

Insecure default administrative credentials in AlloyDB for PostgreSQL

Assigner: GoogleCloud
Reserved: 29.04.2026 Published: 12.05.2026 Updated: 12.05.2026

Prior to 2025-11-03, well-intended users of Terraform or REST API for Google Cloud AlloyDB for PostgreSQL could have created clusters with an insecure default password which could have been exploited by a remote attacker to gain full administrative access to the database.

Exploitation required network access to the AlloyDB cluster and was limited to Terraform or the REST API, as other clients blocked it.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/U:Amber
CVSS Score: 9.2

Product Status

Vendor Google Cloud
Product AlloyDB for PostgreSQL
Versions Default: unaffected
  • affected from 0 to 2025-11-03 (excl.)

Solutions

This vulnerability was patched on November 3, 2025.

Impacted instances have been proactively remediated, and no customer action is needed.

Credits

  • Mark Lawrenson reporter

References

Problem Types

  • CWE-1392 Use of default credentials CWE

Impacts

  • CAPEC-70 Try Common or Default Usernames and Passwords