A privilege escalation vulnerability exists in Google Cloud's Dialogflow CX. Dialogflow agent developers with Webhook editor permission are able to configure Webhooks using Dialogflow service agent access token authentication. This allows the attacker to escalate their privileges from agent-level to project-level, granting them unauthorized access to manage resources in services associated with the project, leading to unexpected costs and resource depletion for the producer project. A fix was applied on the server side to protect from this vulnerability in February 2025. No customer action is required.
History

Wed, 10 Dec 2025 07:30:00 +0000

Type Values Removed Values Added
Description A privilege escalation vulnerability exists in Google Cloud's Dialogflow CX. Dialogflow agent developers with Webhook editor permission are able to configure Webhooks using Dialogflow service agent access token authentication. This allows the attacker to escalate their privileges from agent-level to project-level, granting them unauthorized access to manage resources in services associated with the project, leading to unexpected costs and resource depletion for the producer project. A fix was applied on the server side to protect from this vulnerability in February 2025. No customer action is required.
Title Privilege Escalation in Dialogflow CX via Webhook Admin Role
Weaknesses CWE-269
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/U:Clear'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GoogleCloud

Published: 2025-12-10T07:11:31.026Z

Updated: 2025-12-10T07:11:31.026Z

Reserved: 2025-11-10T13:42:45.771Z

Link: CVE-2025-12952

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-10T08:16:02.637

Modified: 2025-12-10T08:16:02.637

Link: CVE-2025-12952

cve-icon Redhat

No data.