Home

Description

A privilege escalation vulnerability exists in Google Cloud's Dialogflow CX. Dialogflow agent developers with Webhook editor permission are able to configure Webhooks using Dialogflow service agent access token authentication. This allows the attacker to escalate their privileges from agent-level to project-level, granting them unauthorized access to manage resources in services associated with the project, leading to unexpected costs and resource depletion for the producer project. A fix was applied on the server side to protect from this vulnerability in February 2025. No customer action is required.

PUBLISHED Reserved 2025-11-10 | Published 2025-12-10 | Updated 2025-12-10 | Assigner GoogleCloud




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/U:Clear

Problem types

CWE-269 Improper Privilege Management

Product status

Default status
unaffected

Any version before 2025-02
affected

Credits

asterfiester finder

References

docs.cloud.google.com/dialogflow/docs/release-notes

cve.org (CVE-2025-12952)

nvd.nist.gov (CVE-2025-12952)

Download JSON