CVE-2025-12952
BaseFortify
Publication date: 2025-12-10
Last updated on: 2025-12-10
Assigner: GoogleCloud
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dialogflow | 4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a privilege escalation issue in Google Cloud's Dialogflow CX. Developers with Webhook editor permission can configure Webhooks using the Dialogflow service agent access token authentication, which allows them to escalate their privileges from agent-level to project-level. This unauthorized privilege escalation enables attackers to manage resources across the project.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to manage project-level resources, which may result in unexpected costs and resource depletion for the affected project.
What immediate steps should I take to mitigate this vulnerability?
No immediate customer action is required as the fix was applied on the server side in February 2025 to protect from this vulnerability.