In Jenkins WSO2 Oauth Plugin 1.0 and earlier, authentication claims are accepted without validation by the "WSO2 Oauth" security realm, allowing unauthenticated attackers to log in to controllers using this security realm using any username and any password, including usernames that do not exist.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-05-14/#SECURITY-3481 | Vendor Advisory |
Configurations
History
12 Jun 2025, 13:23
Type | Values Removed | Values Added |
---|---|---|
First Time |
Jenkins wso2 Oauth
Jenkins |
|
References | () https://www.jenkins.io/security/advisory/2025-05-14/#SECURITY-3481 - Vendor Advisory | |
CPE | cpe:2.3:a:jenkins:wso2_oauth:*:*:*:*:*:jenkins:*:* |
19 May 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-287 |
15 May 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
14 May 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-14 21:15
Updated : 2025-06-12 13:23
NVD link : CVE-2025-47889
Mitre link : CVE-2025-47889
CVE.ORG link : CVE-2025-47889
JSON object : View
Products Affected
jenkins
- wso2_oauth
CWE
CWE-287
Improper Authentication