A critical security vulnerability exists in remote cache extensions for common build systems utilizing bucket-based remote cache (such as those using Amazon S3, Google Cloud Storage, or similar object storage) that allows any contributor with pull request privileges to inject compromised artifacts from an untrusted environment into trusted production environments without detection.
The vulnerability exploits a fundamental design flaw in the "first-to-cache wins" principle, where artifacts built in untrusted environments (feature branches, pull requests) can poison the cache used by trusted environments (protected branches, production deployments).
This attack bypasses all traditional security measures including encryption, access controls, and checksum validation because the poisoning occurs during the artifact construction phase, before any security measures are applied.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://nx.app/files/cve-2025-06 |
![]() ![]() |
History
Tue, 10 Jun 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Niklas Portmann
Niklas Portmann nx-remotecache-azure Niklas Portmann nx-remotecache-custom Niklas Portmann nx-remotecache-minio Nx Nx azure-cache Nx gcs-cache Nx s3-cache Nx shared-fs-cache |
|
CPEs | cpe:2.3:a:niklas_portmann:nx-remotecache-azure:0:*:*:*:*:*:*:* cpe:2.3:a:niklas_portmann:nx-remotecache-custom:0:*:*:*:*:*:*:* cpe:2.3:a:niklas_portmann:nx-remotecache-minio:0:*:*:*:*:*:*:* cpe:2.3:a:nx:azure-cache:0:*:*:*:*:*:*:* cpe:2.3:a:nx:gcs-cache:0:*:*:*:*:*:*:* cpe:2.3:a:nx:s3-cache:0:*:*:*:*:*:*:* cpe:2.3:a:nx:shared-fs-cache:0:*:*:*:*:*:*:* |
|
Vendors & Products |
Niklas Portmann
Niklas Portmann nx-remotecache-azure Niklas Portmann nx-remotecache-custom Niklas Portmann nx-remotecache-minio Nx Nx azure-cache Nx gcs-cache Nx s3-cache Nx shared-fs-cache |
Tue, 10 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 10 Jun 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A critical security vulnerability exists in remote cache extensions for common build systems utilizing bucket-based remote cache (such as those using Amazon S3, Google Cloud Storage, or similar object storage) that allows any contributor with pull request privileges to inject compromised artifacts from an untrusted environment into trusted production environments without detection. The vulnerability exploits a fundamental design flaw in the "first-to-cache wins" principle, where artifacts built in untrusted environments (feature branches, pull requests) can poison the cache used by trusted environments (protected branches, production deployments). This attack bypasses all traditional security measures including encryption, access controls, and checksum validation because the poisoning occurs during the artifact construction phase, before any security measures are applied. | |
Title | Build Cache Poisoning via Untrusted Pull Requests | |
Weaknesses | CWE-829 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: HeroDevs
Published: 2025-06-10T19:23:33.956Z
Updated: 2025-06-10T21:35:37.274Z
Reserved: 2025-04-15T23:50:31.198Z
Link: CVE-2025-36852

Updated: 2025-06-10T20:12:17.250Z

Status : Awaiting Analysis
Published: 2025-06-10T20:15:22.877
Modified: 2025-06-12T16:06:29.520
Link: CVE-2025-36852

No data.