A critical security vulnerability exists in remote cache extensions for common build systems utilizing bucket-based remote cache (such as those using Amazon S3, Google Cloud Storage, or similar object storage) that allows any contributor with pull request privileges to inject compromised artifacts from an untrusted environment into trusted production environments without detection.  The vulnerability exploits a fundamental design flaw in the "first-to-cache wins" principle, where artifacts built in untrusted environments (feature branches, pull requests) can poison the cache used by trusted environments (protected branches, production deployments).  This attack bypasses all traditional security measures including encryption, access controls, and checksum validation because the poisoning occurs during the artifact construction phase, before any security measures are applied.
References
History

Tue, 10 Jun 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Niklas Portmann
Niklas Portmann nx-remotecache-azure
Niklas Portmann nx-remotecache-custom
Niklas Portmann nx-remotecache-minio
Nx
Nx azure-cache
Nx gcs-cache
Nx s3-cache
Nx shared-fs-cache
CPEs cpe:2.3:a:niklas_portmann:nx-remotecache-azure:0:*:*:*:*:*:*:*
cpe:2.3:a:niklas_portmann:nx-remotecache-custom:0:*:*:*:*:*:*:*
cpe:2.3:a:niklas_portmann:nx-remotecache-minio:0:*:*:*:*:*:*:*
cpe:2.3:a:nx:azure-cache:0:*:*:*:*:*:*:*
cpe:2.3:a:nx:gcs-cache:0:*:*:*:*:*:*:*
cpe:2.3:a:nx:s3-cache:0:*:*:*:*:*:*:*
cpe:2.3:a:nx:shared-fs-cache:0:*:*:*:*:*:*:*
Vendors & Products Niklas Portmann
Niklas Portmann nx-remotecache-azure
Niklas Portmann nx-remotecache-custom
Niklas Portmann nx-remotecache-minio
Nx
Nx azure-cache
Nx gcs-cache
Nx s3-cache
Nx shared-fs-cache

Tue, 10 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Jun 2025 19:45:00 +0000

Type Values Removed Values Added
Description A critical security vulnerability exists in remote cache extensions for common build systems utilizing bucket-based remote cache (such as those using Amazon S3, Google Cloud Storage, or similar object storage) that allows any contributor with pull request privileges to inject compromised artifacts from an untrusted environment into trusted production environments without detection.  The vulnerability exploits a fundamental design flaw in the "first-to-cache wins" principle, where artifacts built in untrusted environments (feature branches, pull requests) can poison the cache used by trusted environments (protected branches, production deployments).  This attack bypasses all traditional security measures including encryption, access controls, and checksum validation because the poisoning occurs during the artifact construction phase, before any security measures are applied.
Title Build Cache Poisoning via Untrusted Pull Requests
Weaknesses CWE-829
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:U/V:C/RE:M/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HeroDevs

Published: 2025-06-10T19:23:33.956Z

Updated: 2025-06-10T21:35:37.274Z

Reserved: 2025-04-15T23:50:31.198Z

Link: CVE-2025-36852

cve-icon Vulnrichment

Updated: 2025-06-10T20:12:17.250Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-10T20:15:22.877

Modified: 2025-06-12T16:06:29.520

Link: CVE-2025-36852

cve-icon Redhat

No data.