The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-23630

CVE-2022-23630: Gradle Information Disclosure Vulnerability

CVE-2022-23630 is an information disclosure vulnerability in Gradle that allows dependency verification bypass. Attackers may exploit this to introduce untrusted artifacts. This article covers technical details, affected versions, and fixes.

Published: February 18, 2026

CVE-2022-23630 Overview

CVE-2022-23630 is a dependency verification bypass vulnerability in Gradle, a popular build automation tool widely used for multi-language development projects. The vulnerability allows Gradle to skip dependency verification under specific conditions, potentially accepting untrusted external artifacts that would otherwise fail the build process. This flaw occurs when dependency verification is disabled on one or more configurations that share common dependencies with other configurations where verification is enabled. If the configuration with disabled verification is resolved first, Gradle fails to verify the shared dependencies for the configuration that has verification active.

Critical Impact

Attackers could potentially inject malicious dependencies into software builds by exploiting the verification bypass, leading to supply chain compromise and execution of untrusted code within development and production environments.

Affected Products

  • Gradle versions prior to 7.4
  • Projects using ResolutionStrategy.disableDependencyVerification() method
  • Builds with mixed dependency verification configurations

Discovery Timeline

  • 2022-02-10 - CVE CVE-2022-23630 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2022-23630

Vulnerability Analysis

This vulnerability falls under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere), which describes scenarios where software imports or includes functionality from a source outside of its trust boundary without sufficiently verifying that the source is trustworthy. In this case, Gradle's dependency verification mechanism can be circumvented when configurations with different verification settings share common dependencies.

The flaw exploits a race condition in how Gradle processes dependency resolution across multiple configurations. When a build contains configurations with dependency verification both enabled and disabled, the order of resolution becomes critical. If a configuration with verification disabled resolves first, the cached artifacts are then reused by subsequent configurations without additional verification checks, effectively bypassing the security control.

Root Cause

The root cause lies in Gradle's artifact caching mechanism and how resolved artifacts were shared between verified and non-verified configurations. The ResolvedArtifactCaches component did not differentiate between artifacts that required verification and those that did not. When the provideResolvedArtifactCache() method was called, it did not consider whether the resolution strategy had dependency verification enabled, causing verified and unverified artifacts to be mixed in the same cache.

Attack Vector

An attacker could exploit this vulnerability through a supply chain attack scenario. By compromising an artifact repository or performing a man-in-the-middle attack during dependency resolution, an attacker could inject malicious dependencies. If the victim's build configuration inadvertently resolves a non-verified configuration before a verified one, the malicious artifacts would be cached and subsequently trusted by verified configurations. This attack requires network access and the ability to influence the artifact resolution process, along with specific build configuration patterns that mix verification settings.

java
// Security patch in ResolveIvyFactory.java
// Source: https://github.com/gradle/gradle/commit/88ab9b652933bc3b2e3161b31ad8b8f4f0516351

                moduleComponentRepository = startParameterResolutionOverride.overrideModuleVersionRepository(moduleComponentRepository);
                moduleComponentRepository = new CachingModuleComponentRepository(moduleComponentRepository, cacheProvider.getPersistentCaches(), cachePolicy, timeProvider, componentMetadataProcessor, listener);
            }
-            moduleComponentRepository = cacheProvider.getResolvedArtifactCaches().provideResolvedArtifactCache(moduleComponentRepository);
+            moduleComponentRepository = cacheProvider.getResolvedArtifactCaches().provideResolvedArtifactCache(moduleComponentRepository, resolutionStrategy.isDependencyVerificationEnabled());

            if (baseRepository.isDynamicResolveMode()) {
                moduleComponentRepository = new IvyDynamicResolveModuleComponentRepository(moduleComponentRepository);

The fix modifies the provideResolvedArtifactCache() method to include a parameter indicating whether dependency verification is enabled for the current resolution strategy, ensuring that verified and non-verified artifacts are properly segregated.

Detection Methods for CVE-2022-23630

Indicators of Compromise

  • Unexpected or unauthorized dependencies appearing in build outputs
  • Build logs showing dependency resolution patterns where non-verified configurations resolve before verified ones
  • Discrepancies between expected dependency checksums and actual resolved artifacts
  • Unusual network activity during build processes to untrusted artifact sources

Detection Strategies

  • Audit Gradle build scripts for usage of ResolutionStrategy.disableDependencyVerification() method
  • Review build configuration files for mixed dependency verification settings across configurations
  • Implement artifact integrity monitoring to compare resolved dependencies against known-good checksums
  • Enable verbose logging during Gradle builds to track dependency resolution order

Monitoring Recommendations

  • Monitor CI/CD pipelines for changes to dependency verification settings
  • Implement Software Composition Analysis (SCA) tools to track dependency changes
  • Set up alerts for new or modified dependencies in build outputs
  • Regularly audit plugin configurations that may disable dependency verification

How to Mitigate CVE-2022-23630

Immediate Actions Required

  • Upgrade Gradle to version 7.4 or later immediately
  • Audit all build configurations for usage of ResolutionStrategy.disableDependencyVerification() method
  • Review and remove plugins that disable dependency verification for single configurations
  • Ensure dependency verification is consistently enabled across all configurations

Patch Information

Gradle version 7.4 addresses this vulnerability by validating artifacts at least once if they are present in a resolved configuration that has dependency verification active. The fix ensures that verified and non-verified artifacts are not shared between configurations. Detailed information is available in the Gradle 7.4 Release Notes and the GitHub Security Advisory GHSA-9pf5-88jw-3qgr. The security patch can be reviewed at Gradle Commit 88ab9b6.

Workarounds

  • Do not use ResolutionStrategy.disableDependencyVerification() in any build configuration
  • Avoid using plugins that disable dependency verification for individual configurations
  • Ensure that configurations with dependency verification disabled are never resolved in builds that also resolve configurations with verification enabled
  • Consider implementing manual verification steps for all dependencies until upgrade is possible
groovy
# Configuration example - Enable dependency verification consistently
# In your build.gradle or settings.gradle

// Do NOT use this pattern as it creates the vulnerability:
// configurations.someConfig.resolutionStrategy.disableDependencyVerification()

// Instead, ensure verification is enabled for all configurations:
// settings.gradle
dependencyResolutionManagement {
    // Keep dependency verification enabled globally
    // Do not disable on any individual configuration
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechGradle

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.61%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-829
  • Vendor Resources
  • Gradle 7.4 Release Notes

  • Gradle Commit 88ab9b6

  • GitHub Security Advisory GHSA-9pf5-88jw-3qgr
  • Related CVEs
  • CVE-2026-25063: gradle-completion RCE Vulnerability

  • CVE-2026-22865: Gradle Build Tool DOS Vulnerability

  • CVE-2026-22816: Gradle Build Automation RCE Vulnerability

  • CVE-2023-35947: Gradle Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English