In Jenkins OpenID Connect Provider Plugin 96.vee8ed882ec4d and earlier the generation of build ID Tokens uses potentially overridden values of environment variables, in conjunction with certain other plugins allowing attackers able to configure jobs to craft a build ID Token that impersonates a trusted job, potentially gaining unauthorized access to external services.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-05-14/#SECURITY-3574 | Vendor Advisory |
Configurations
History
12 Jun 2025, 13:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jenkins:openid_connect_provider:*:*:*:*:*:jenkins:*:* | |
First Time |
Jenkins openid Connect Provider
Jenkins |
|
References | () https://www.jenkins.io/security/advisory/2025-05-14/#SECURITY-3574 - Vendor Advisory |
16 May 2025, 14:43
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 May 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
CWE | CWE-284 |
14 May 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-14 21:15
Updated : 2025-06-12 13:48
NVD link : CVE-2025-47884
Mitre link : CVE-2025-47884
CVE.ORG link : CVE-2025-47884
JSON object : View
Products Affected
jenkins
- openid_connect_provider
CWE
CWE-284
Improper Access Control