{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T15:00:58.252","vulnerabilities":[{"cve":{"id":"CVE-2025-36852","sourceIdentifier":"36c7be3b-2937-45df-85ea-ca7133ea542c","published":"2025-06-10T20:15:22.877","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A critical security vulnerability exists in remote cache extensions for common build systems utilizing bucket-based remote cache (such as those using Amazon S3, Google Cloud Storage, or similar object storage) that allows any contributor with pull request privileges to inject compromised artifacts from an untrusted environment into trusted production environments without detection. \n\n\n\n\nThe vulnerability exploits a fundamental design flaw in the \"first-to-cache wins\" principle, where artifacts built in untrusted environments (feature branches, pull requests) can poison the cache used by trusted environments (protected branches, production deployments). \n\n\n\n\nThis attack bypasses all traditional security measures including encryption, access controls, and checksum validation because the poisoning occurs during the artifact construction phase, before any security measures are applied."},{"lang":"es","value":"Existe una vulnerabilidad de seguridad crítica en las extensiones de caché remota para sistemas de compilación comunes que utilizan caché remota basada en buckets (como los que usan Amazon S3, Google Cloud Storage o almacenamiento de objetos similar). Esta vulnerabilidad permite a cualquier colaborador con privilegios de solicitud de extracción inyectar artefactos comprometidos desde un entorno no confiable en entornos de producción confiables sin ser detectado. Esta vulnerabilidad explota un fallo de diseño fundamental en el principio de \"primero en almacenar en caché, gana\", según el cual los artefactos compilados en entornos no confiables (ramas de características, solicitudes de extracción) pueden contaminar la caché utilizada por entornos confiables (ramas protegidas, implementaciones de producción). Este ataque elude todas las medidas de seguridad tradicionales, como el cifrado, los controles de acceso y la validación de sumas de comprobación, ya que el envenenamiento se produce durante la fase de construcción del artefacto, antes de que se apliquen las medidas de seguridad."}],"metrics":{"cvssMetricV40":[{"source":"36c7be3b-2937-45df-85ea-ca7133ea542c","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:U/V:C/RE:M/U:Red","baseScore":9.4,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"PRESENT","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED"}}]},"weaknesses":[{"source":"36c7be3b-2937-45df-85ea-ca7133ea542c","type":"Secondary","description":[{"lang":"en","value":"CWE-829"}]}],"references":[{"url":"https://nx.app/files/cve-2025-06","source":"36c7be3b-2937-45df-85ea-ca7133ea542c"}]}}]}