Prior to 2025-11-03, well-intended users of Terraform or REST API for Google Cloud AlloyDB for PostgreSQL could have created clusters with an insecure default password which could have been exploited by a remote attacker to gain full administrative access to the database.
Exploitation required network access to the AlloyDB cluster and was limited to Terraform or the REST API, as other clients blocked it.
Metrics
Affected Vendors & Products
References
History
Tue, 12 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Prior to 2025-11-03, well-intended users of Terraform or REST API for Google Cloud AlloyDB for PostgreSQL could have created clusters with an insecure default password which could have been exploited by a remote attacker to gain full administrative access to the database. Exploitation required network access to the AlloyDB cluster and was limited to Terraform or the REST API, as other clients blocked it. | |
| Title | Insecure default administrative credentials in AlloyDB for PostgreSQL | |
| Weaknesses | CWE-1392 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GoogleCloud
Published:
Updated: 2026-05-12T12:25:06.189Z
Reserved: 2026-04-29T14:38:05.602Z
Link: CVE-2026-7428
Updated: 2026-05-12T12:25:01.074Z
Status : Received
Published: 2026-05-12T10:16:48.490
Modified: 2026-05-12T10:16:48.490
Link: CVE-2026-7428
No data.
OpenCVE Enrichment
Updated: 2026-05-12T11:15:14Z