Research disclosed a now-patched high-severity vulnerability in Google Cloud Platform’s (GCP) Cloud Composer service, dubbed ConfusedComposer.
It could have allowed attackers to hijack cloud workflows and gain control over critical resources. The flaw highlights risks in automated cloud service orchestration.
What Is ConfusedComposer?
Cloud Composer, GCP’s managed Apache Airflow service for workflow automation, relies on Cloud Build (GCP’s CI/CD tool) to install custom Python PyPI packages.
Tenable found that an attacker with the composer.environments.update permission could inject a malicious PyPI package into a Composer environment.
When Cloud Build installs such packages, it automatically runs pre-/post-installation scripts via Python’s Pip tool.
Attackers could exploit this to execute arbitrary code within the Cloud Build instance tied to the default Cloud Build service account—a highly privileged identity with permissions to:
- Modify Cloud Build pipelines
- Access Cloud Storage buckets
- Manipulate Artifact Registry containers
- Deploy code across projects
Attack Workflow: From Package Upload to Full Compromise
- Injection: Attacker adds a malicious PyPI package to a Composer environment.
- Execution: Cloud Build installs the package, triggering embedded scripts.
- Token Theft: Scripts query GCP’s metadata server to steal the Cloud Build service account token.
- Escalation: Attacker uses the token to impersonate the service account, potentially taking over the entire project.


“This bypassed the need for direct access to Cloud Build or Composer service accounts,” said Tenable researcher Gavin Milnthorpe. “The trusted automation pipeline became the attack vector.”
Google resolved the flaw by reconfiguring Composer to use its own service account (with limited permissions) instead of the default Cloud Build account during PyPI installations. Key actions include:
- Rolling out patches for new Composer environments as of March 2025.
- Requiring existing instances to update by April 2025.
- Updating Composer documentation on access control and dependency management.
ConfusedComposer follows 2024’s ConfusedFunction vulnerability, part of a pattern Tenable calls Jenga®-style attacks.
These exploit hidden permissions in cloud services that automatically provision resources (e.g., serverless functions, CI/CD pipelines).
“Cloud providers abstract complexity, but this creates blind spots,” Milnthorpe noted. “Attackers chain these ‘behind-the-scenes’ services to escalate access.”
- Update Composer: Ensure environments are patched to use the restricted service account.
- Audit Permissions: Limit composer.environments.update to trusted users.
- Monitor Cloud Build: Restrict default service account permissions via IAM.
Google confirmed no active exploits were detected before the patch. However, the flaw underscores the need for rigorous oversight in multi-service cloud environments.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!