A newly discovered vulnerability in Google Drive Desktop for Windows shatters the trust in one of the most widely used file-syncing applications.
Researchers have identified a broken access control flaw that enables any logged-in user on a shared Windows machine to gain full access to another user’s Drive contents My Drive and Shared Drives alike, without re-authentication.
This vulnerability puts sensitive contracts, financial records, proprietary code, and personal photos at risk, undermining fundamental security principles such as Zero Trust, encryption at rest, and session management.
Google Drive Desktop caches synchronized files locally in a hidden directory using DriveFS. However, these caches are not properly isolated between Windows user profiles.
By copying the contents of one user’s DriveFS folder into another’s, the app blindly “trusts” the copied cache and loads the victim’s Drive data as if the attacker were the legitimate owner.
No re-authentication is required, and cached sessions persist indefinitely, violating encryption-at-rest expectations.
This flaw is especially dangerous in multi-user environments such as corporate workstations, university labs, or coworking spaces.
An insider or simply anyone with local access can silently exfiltrate sensitive data, modify or delete files, and disrupt operations.
According to the Verizon DBIR 2024, insider threats account for 22 percent of breaches, and the Ponemon Institute reports an average annual cost of $15.38 million for insider incidents, making this issue far from theoretical.
Researchers tested the flaw on Windows 10 and 11 with Google Drive Desktop version 112.0.3.0:
C:\Users\<victim>\AppData\Local\Google\DriveFS\<ID>\C:\Users\<attacker>\AppData\Local\Google\DriveFS\<ID>\.Figure 1. Cross-user exposure by copying the DriveFS cache between profiles.
| CVE | Product | Vulnerability | Impact | CVSS 3.1 Score |
|---|---|---|---|---|
| CVE-2025-5150 | Google Drive Desktop for Windows 112.0.3.0 | Broken access control in DriveFS cache | Unauthorized data disclosure, modification | 7.8 (High) |
For Google
For Users and Organizations (Interim Controls)
Google Drive Desktop’s failure to enforce Zero Trust principles, encryption at rest, and session re-authentication exposes organizations to severe insider-threat risks and non-compliance with standards like NIST SP 800-53, ISO 27001, and HIPAA.
Until Google addresses this vulnerability, IT administrators and users must adopt interim mitigations to safeguard sensitive data on shared Windows machines.
Find this Story Interesting! Follow us on Google News, LinkedIn and X to Get More Instant Updates
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.