Local Privilege Escalation Vulnerability in Gradle's Native-Platform Tool
CVE-2025-27148

8.8HIGH

Key Information:

Vendor
Gradle
Status
Gradle
Vendor
CVE Published:
25 February 2025

Summary

The Gradle's native-platform tool on Unix-like systems was found to create system temporary directories with open permissions, allowing unauthorized users to manipulate files, leading to potential local privilege escalation. This vulnerability arises from improper initialization of the library when the Native.get(Class<>) method is called without the required Native.init(File) invocation. Users of Gradle versions before 8.12 are advised to update to the patched versions (8.12.1 and later) to mitigate this issue. Affected users can also take precautions by ensuring the ‘sticky’ bit is set on the temporary directory, limiting the ability to delete files to the owner only.

Affected Version(s)

gradle = 8.12

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.