#VU106023 Creation of Temporary File With Insecure Permissions in gradle - CVE-2025-27148
Published: March 25, 2025
Vulnerability identifier: #VU106023
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2025-27148
CWE-ID: CWE-378
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
gradle
gradle
Software vendor:
Gradle
Gradle
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the system temporary directory can be created with open permissions. A local user can gain elevated privileges on the target system.
Remediation
Install updates from vendor's website.
External links
- https://en.wikipedia.org/wiki/Fstab#Options_common_to_all_filesystems
- https://en.wikipedia.org/wiki/Sticky_bit
- https://github.com/gradle/gradle/pull/32025
- https://github.com/gradle/gradle/security/advisories/GHSA-465q-w4mf-4f4r
- https://github.com/gradle/gradle/security/advisories/GHSA-89qm-pxvm-p336
- https://github.com/gradle/native-platform/blob/574dfe8d9fb546c990436468d617ab81c140871d/native-platform/src/main/java/net/rubygrapefruit/platform/internal/NativeLibraryLocator.java#L68-L78
- https://github.com/gradle/native-platform/pull/353
- https://github.com/gradle/native-platform/security/advisories/GHSA-2xxp-vw2f-p3x8