Skip to content

Commit 550c7e3

Browse files
vsavkinFrozenPandaz
authored andcommitted
fix(nx-dev): small adjustment to the blog post
(cherry picked from commit bd898d3)
1 parent f6baa75 commit 550c7e3

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

docs/blog/2025-06-12-cve-2025-36852-critical-cache-poisoning-vulnerability-creep.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,10 @@ The CREEP vulnerability allows any contributor with pull request privileges to i
1818
- Nx Cloud is **NOT** affected due to its security architecture
1919
- Review this post to determine if your self-hosted cache solution is vulnerable
2020

21+
{% callout type="warn" title="DIY implementations are vulnerable" %}
22+
DIY remote caches are likely vulnerable. Scanners won't catch all affected implementations, so understanding the vulnerability is crucial.
23+
{% /callout %}
24+
2125
## **Understanding the Vulnerability**
2226

2327
A typical remote-cache flow using storage services follows these steps:
@@ -93,5 +97,6 @@ CVE-2025-36852 represents a serious threat to organizations using vulnerable cac
9397

9498
- If your organization uses bucket-based remote caching: immediate action is required
9599
- If your organization uses other self-hosted remote cache solutions: immediate review required (most self-hosted caching solutions across many build systems—not just JavaScript, but also Java—are affected)
100+
- If your organization uses custom tasks runners to implement remote caching: immediate review required
96101
- If using Nx without remote caching: no action is required
97102
- If using Nx with Nx Cloud: [Review your settings](/ci/concepts/cache-security#use-scoped-tokens-in-ci). If you are using default settings, no actions should be required.

0 commit comments

Comments
 (0)