This vulnerability was patched and no customer action is needed.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://discuss.google.dev/t/november-23-2025/332118 |
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Appsheet
Appsheet appsheet Web (main Server) |
|
| Vendors & Products |
Appsheet
Appsheet appsheet Web (main Server) |
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A SSRF and Arbitrary File Read vulnerability in AppSheet Core in Google AppSheet prior to 2025-11-23 allows an authenticated remote attacker to read sensitive local files and access internal network resources via crafted requests to the production cluster. This vulnerability was patched and no customer action is needed. | |
| Title | Arbitrary File Read and SSRF in Google AppSheet | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GoogleCloud
Published:
Updated: 2026-02-19T19:55:23.508Z
Reserved: 2026-02-10T11:57:47.527Z
Link: CVE-2026-2274
Updated: 2026-02-19T19:55:17.343Z
Status : Deferred
Published: 2026-02-19T16:27:16.287
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-2274
No data.
OpenCVE Enrichment
Updated: 2026-04-18T12:00:05Z