Impact
In Gradle versions earlier than 9.3.0, dependency resolution failures did not disable the offending repository. The system would then proceed to the next repository in the list, potentially pulling artifacts from a malicious or compromised source. This flaw enables a threat actor who manages or can influence a repository to supply malicious build artifacts to downstream users, compromising the integrity of build outputs. The weakness is categorized as CWE-494 and CWE-829, indicating the use of untrusted content and parameter misuse.
Affected Systems
Gradle build automation tool, all versions before 9.3.0, affecting any projects that use native-platform dependency resolution.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.6, underscoring a high risk to confidentiality and integrity. The EPSS score of less than 1% suggests a low probability of exploitation in the wild. The flaw is not currently listed in CISA’s KEV catalog. Exploitation requires the attacker to control a repository that is queried after a failed resolution attempt, thereby enabling the delivery of malicious artifacts; the attack vector is therefore indirect and requires repository-level compromise.
OpenCVE Enrichment