Cyber Posture

CVE-2026-22816

High

Published: 16 January 2026

Published
16 January 2026
Modified
18 February 2026
KEV Added
Patch
CVSS Score 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0002 7.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22816 is a high-severity Download of Code Without Integrity Check (CWE-494) vulnerability in Gradle Gradle. Its CVSS base score is 7.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Compromise Software Dependencies and Development Tools (T1195.001); ranked at the 7.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Compromise Software Dependencies and Development Tools (T1195.001) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-829 CWE-494

Enforcing installation policies prevents users from including functionality obtained from untrusted control spheres.

addresses: CWE-829 CWE-494

Strategy mandates assessment of third-party components and suppliers, directly reducing inclusion of functionality from untrusted control spheres.

addresses: CWE-494 CWE-829

Supply chain protection requires integrity verification of acquired components, directly reducing insertion or tampering of malicious code during delivery.

addresses: CWE-829 CWE-494

Limits inclusion of functionality from untrusted sources through supply-chain and component trustworthiness evaluation before integration.

addresses: CWE-494 CWE-829

Component authenticity requires verifying origin/integrity of acquired firmware or software, directly preventing inclusion of code without integrity checks.

addresses: CWE-829 CWE-494

Allocation of supply-chain risk management responsibilities and vetting of the development/operational environment reduce inclusion of functionality from untrusted control spheres.

addresses: CWE-494 CWE-829

Authorizing and controlling mobile code requires verifying origin and integrity before download/execution, directly preventing this weakness.

addresses: CWE-494 CWE-829

Proactive network scanning for malicious code directly detects and blocks downloads that lack integrity verification.

MITRE ATT&CK Enterprise TechniquesAI

T1195.001 Compromise Software Dependencies and Development Tools Initial Access
Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise.
T1195.002 Compromise Software Supply Chain Initial Access
Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise.
Why these techniques?

Vulnerability directly enables supply chain compromise by allowing fallback to attacker-controlled repositories during dependency resolution, facilitating malicious artifact injection (CWE-494/829).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled.…

more

If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. If a Gradle build used an unresolvable host name, Gradle would continue to work as long as all dependencies could be resolved from another repository. An unresolvable host name could be caused by allowing a repository's domain name registration to lapse or typo-ing the real domain name. This behavior could allow an attacker to register a service under the host name used by the build and serve malicious artifacts. The attack requires the repository to be listed before others in the build configuration. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors.

Deeper analysisAI

CVE-2026-22816 affects Gradle, a build automation tool, specifically its dependency resolution process in versions prior to 9.3.0. The native-platform tool in Gradle provides Java bindings for native APIs, but during dependency resolution, certain exceptions—such as those from unresolvable host names—were not treated as fatal errors. Instead, Gradle would proceed to the next repository in the configuration list, potentially resolving dependencies from an alternative source. This behavior stems from CWEs-494 (Download of Code Without Integrity Check) and CWE-829 (Inclusion of Functionality from Untrusted Control Sphere), with a CVSS v3.1 base score of 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).

An attacker can exploit this vulnerability by registering a domain name that matches a lapsed registration or a typo in a repository URL listed in a Gradle build configuration. No special privileges are required, only the ability to control a domain and host a malicious repository, with network access to the build environment. For successful exploitation, the targeted repository must be listed before others in the configuration; Gradle will attempt resolution there first, and if the attacker has made the previously unresolvable host active, it can serve malicious artifacts. This enables a supply chain attack, allowing arbitrary code execution via tampered dependencies, compromising confidentiality and integrity.

The Gradle security advisory (GHSA-w78c-w6vf-rw82) and associated commit (e5707d0d8fce3d768c9c489004700d78eab1773a) detail the fix in Gradle 9.3.0, which treats these exceptions as fatal and halts resolution without falling back to other repositories. Security practitioners should upgrade to Gradle 9.3.0 or later and review build configurations for repository order, domain accuracy, and lapsed registrations to mitigate risks.

Details

CWE(s)

Affected Products

gradle
gradle
≤ 8.14.4 · 9.0.0 — 9.3.0

CVEs Like This One

CVE-2026-22865Same product: Gradle Gradle
CVE-2026-25063Same vendor: Gradle
CVE-2025-34212Shared CWE-494
CVE-2026-26974Shared CWE-829
CVE-2025-69263Shared CWE-494
CVE-2025-15556Shared CWE-494
CVE-2025-27607Shared CWE-829
CVE-2025-27510Shared CWE-829
CVE-2026-43569Shared CWE-829
CVE-2025-15612Shared CWE-829

References