In Jenkins WSO2 Oauth Plugin 1.0 and earlier, authentication claims are accepted without validation by the "WSO2 Oauth" security realm, allowing unauthenticated attackers to log in to controllers using this security realm using any username and any password, including usernames that do not exist.
References
Configurations
No configuration.
History
19 May 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-287 |
15 May 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
14 May 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-14 21:15
Updated : 2025-05-19 16:15
NVD link : CVE-2025-47889
Mitre link : CVE-2025-47889
CVE.ORG link : CVE-2025-47889
JSON object : View
Products Affected
No product.
CWE
CWE-287
Improper Authentication