All instances after January 30th, 2026 have been patched to protect from this vulnerability. No user action is required for this.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google Cloud
Google Cloud vertex Ai |
|
| Vendors & Products |
Google Cloud
Google Cloud vertex Ai |
Thu, 26 Feb 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in Google Cloud Vertex AI Workbench from 7/21/2025 to 01/30/2026 allows an attacker to exfiltrate valid Google Cloud access tokens of other users via abuse of a built-in startup script. All instances after January 30th, 2026 have been patched to protect from this vulnerability. No user action is required for this. | |
| Title | Sensitive Data Exposure in Google Cloud Vertex AI Workbench | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GoogleCloud
Published:
Updated: 2026-02-26T14:59:56.045Z
Reserved: 2026-02-09T10:55:54.465Z
Link: CVE-2026-2244
No data.
Status : Deferred
Published: 2026-02-26T15:17:45.250
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-2244
No data.
OpenCVE Enrichment
Updated: 2026-04-17T14:30:20Z