Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform
Briefly

An attacker could escalate their privileges to the Default Cloud Build Service Account and access numerous services such as Cloud Build, storage (including the source code of other functions), artifact registry and container registry.
This access allows for lateral movement and privilege escalation in a victim's project, to access unauthorized data and even update or delete it.
The problem discovered by Tenable has to do with the fact that a Cloud Build service account is created in the background and linked to a Cloud Build instance by default when a Cloud Function is created or updated.
Read at The Hacker News
[
|
]