Cyber Posture

CVE-2026-3136

Critical

Published: 03 March 2026

Published
03 March 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 24.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-3136 is a critical-severity Incorrect Authorization (CWE-863) vulnerability in Google Cloud Build. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations to directly prevent improper authorization vulnerabilities like CVE-2026-3136 that allow unauthenticated remote code execution in Cloud Build.

prevent

Requires timely identification, reporting, and correction of flaws such as this improper authorization vulnerability through patching, as demonstrated by Google's fix on January 26, 2026.

prevent

Limits privileges in the build environment to minimize the impact of arbitrary code execution even if authorization is bypassed.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1195.002 Compromise Software Supply Chain Initial Access
Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise.
Why these techniques?

CVE enables exploitation of a public-facing cloud application (T1190) for arbitrary code execution in build pipelines, directly facilitating software supply chain compromise (T1195.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An improper authorization vulnerability in GitHub Trigger Comment Control in Google Cloud Build prior to 2026-1-26 allows a remote attacker to execute arbitrary code in the build environment. This vulnerability was patched on 26 January 2026, and no customer action…

more

is needed.

Deeper analysisAI

CVE-2026-3136 is an improper authorization vulnerability (CWE-863) in the GitHub Trigger Comment Control feature of Google Cloud Build versions prior to the patch released on January 26, 2026. This flaw enables a remote attacker to execute arbitrary code within the build environment, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) due to its critical impact on confidentiality, integrity, and availability.

The vulnerability can be exploited by any unauthenticated remote attacker over the network with low complexity and no user interaction required. Successful exploitation grants the attacker the ability to run arbitrary code in the Cloud Build environment, potentially leading to full compromise of build pipelines, data exfiltration, or further lateral movement within the cloud infrastructure.

Google patched the issue on January 26, 2026, and states that no customer action is required. Additional details are available in the Cloud Build release notes at https://docs.cloud.google.com/build/docs/release-notes#March_03_2026.

Details

CWE(s)

Affected Products

google
cloud build
≤ 2026-1-26

CVEs Like This One

CVE-2026-0116Same vendor: Google
CVE-2025-48530Same vendor: Google
CVE-2026-0006Same vendor: Google
CVE-2026-0120Same vendor: Google
CVE-2025-36937Same vendor: Google
CVE-2026-0114Same vendor: Google
CVE-2026-0113Same vendor: Google
CVE-2025-48626Same vendor: Google
CVE-2025-0074Same vendor: Google
CVE-2025-22403Same vendor: Google

References