Platform
python
Component
google-adk
Fixed in
1.28.2
2.0.0a2
1.28.1
1.28.1
CVE-2026-4810 is a critical code injection and missing authentication vulnerability discovered in Google Agent Development Kit (ADK) versions 1.7.0 through 1.28.1, and 2.0.0a1 and 2.0.0a2. This flaw allows an unauthenticated remote attacker to execute arbitrary code on the server hosting the ADK instance. Affected versions include those running on Python (OSS), Cloud Run, and GKE. A patch is available in versions 1.28.1 and 2.0.0a2.
The impact of CVE-2026-4810 is severe due to the lack of authentication required to exploit it. An attacker can remotely execute arbitrary code on the server, potentially gaining complete control over the system. This could lead to data breaches, system compromise, and further lateral movement within the network. The ability to execute code without authentication significantly broadens the attack surface and increases the risk of exploitation. Successful exploitation could allow attackers to steal sensitive data, install malware, or disrupt services.
This vulnerability was publicly disclosed on 2026-04-13. The severity is considered critical due to the ease of exploitation and potential impact. Public proof-of-concept code is not currently available, but the lack of authentication makes exploitation relatively straightforward. It is recommended to prioritize patching this vulnerability given its critical severity.
Exploit Status
EPSS
0.35% (58% percentile)
CISA SSVC
The primary mitigation for CVE-2026-4810 is to upgrade to version 1.28.1 or 2.0.0a2. It's crucial to redeploy the upgraded ADK to all production environments to ensure complete protection. Additionally, if you are running ADK Web locally, you must also upgrade your local instance. There are no immediate workarounds beyond upgrading. After upgrading, confirm the fix by attempting to trigger the vulnerable endpoint with an unauthenticated request; it should now be rejected.
Update the ADK to version 1.28.2 or later to mitigate the remote code execution vulnerability. Ensure you update both production instances and local ADK Web installations.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-4810 is a critical vulnerability in Google ADK versions ≤1.9.0 allowing unauthenticated remote code execution. The CVSS score is 9.5, indicating a severe risk.
You are affected if you are using Google ADK versions 1.7.0 through 1.28.1, or 2.0.0a1 and 2.0.0a2, deployed on Python (OSS), Cloud Run, or GKE.
Upgrade to version 1.28.1 or 2.0.0a2. Remember to redeploy the upgraded ADK to all production and local environments.
While no active exploitation has been confirmed, the ease of exploitation and critical severity warrant immediate patching.
Refer to the official Google Security Blog for details: [https://cloud.google.com/security/announcements/google-adk-vulnerability](https://cloud.google.com/security/announcements/google-adk-vulnerability)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.