In Jenkins OpenID Connect Provider Plugin 96.vee8ed882ec4d and earlier the generation of build ID Tokens uses potentially overridden values of environment variables, in conjunction with certain other plugins allowing attackers able to configure jobs to craft a build ID Token that impersonates a trusted job, potentially gaining unauthorized access to external services.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-05-14/#SECURITY-3574 | Vendor Advisory |
Configurations
History
12 Jun 2025, 13:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jenkins:openid_connect_provider:*:*:*:*:*:jenkins:*:* | |
References | () https://www.jenkins.io/security/advisory/2025-05-14/#SECURITY-3574 - Vendor Advisory | |
First Time |
Jenkins
Jenkins openid Connect Provider |
16 May 2025, 14:43
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 May 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
CWE | CWE-284 |
14 May 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-14 21:15
Updated : 2025-06-12 13:48
NVD link : CVE-2025-47884
Mitre link : CVE-2025-47884
CVE.ORG link : CVE-2025-47884
JSON object : View
Products Affected
jenkins
- openid_connect_provider
CWE
CWE-284
Improper Access Control