Description
Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-registered worker UUID. The resulting session has PeerAuth::Open, i.e. it sees jobs from every organisation, and can immediately NarPush/NarUploaded arbitrary store paths into nar_storage and the cached_path table. This vulnerability is fixed in 1.1.1.
Published: 2026-05-14
Score: 9.4 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Gradient, a nix‑based continuous integration system, has a flaw that allows anyone who can reach the /proto endpoint to register as a worker without credentials. The registration grants a session with PeerAuth::Open, which can read jobs from every organisation and write arbitrary store paths into nar_storage and the cached_path table. This permits malicious actors to poison the cache or write unexpected data, potentially leading to compromised builds or unauthorized code execution. The weakness is classified as authentication bypass (CWE‑306), cache poisoning (CWE‑345), and privilege escalation (CWE‑862).

Affected Systems

The product affected is Gradient by wavelens, version 1.1.0. Users running this version should be aware that the default configuration enables the vulnerable discoverable mode (GRADIENT_DISCOVERABLE=true). No other product versions are known to be affected.

Risk and Exploitability

The vulnerability scores 9.4 on the CVSS scale, indicating a high‑severity risk. No EPSS score is available, and it is not listed in the CISA KEV catalog. The likely attack vector is remote network access to the /proto endpoint; an attacker does not need any prior authentication and can perform the exploit from any machine that can reach the service. The vulnerability was fixed in version 1.1.1, meaning the attack can be mitigated by upgrading or by disabling the discoverable mode.

Generated by OpenCVE AI on May 14, 2026 at 20:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Gradient to version 1.1.1 or later where the issue is fixed.
  • Configure the system to set GRADIENT_DISCOVERABLE=false to prevent unauthenticated worker registration.
  • Restrict network access to the /proto endpoint using firewalls or network segmentation so that only trusted hosts can reach it.

Generated by OpenCVE AI on May 14, 2026 at 20:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 16 May 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Wavelens
Wavelens gradient
Vendors & Products Wavelens
Wavelens gradient

Thu, 14 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-registered worker UUID. The resulting session has PeerAuth::Open, i.e. it sees jobs from every organisation, and can immediately NarPush/NarUploaded arbitrary store paths into nar_storage and the cached_path table. This vulnerability is fixed in 1.1.1.
Title Gradient: Unauthenticated worker on /proto → arbitrary NAR write / cache poisoning
Weaknesses CWE-306
CWE-345
CWE-862
References
Metrics cvssV3_1

{'score': 9.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H'}


Subscriptions

Wavelens Gradient
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-16T00:50:50.162Z

Reserved: 2026-05-06T21:49:12.425Z

Link: CVE-2026-44592

cve-icon Vulnrichment

Updated: 2026-05-16T00:50:46.392Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T19:16:38.147

Modified: 2026-05-15T14:44:49.877

Link: CVE-2026-44592

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T11:21:06Z

Weaknesses