Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-43408: Vulnerability in Jenkins project Jenkins Pipeline: Stage View Plugin

0
Medium
VulnerabilityCVE-2022-43408cvecve-2022-43408
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Jenkins project
Product: Jenkins Pipeline: Stage View Plugin

Description

Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.

AI-Powered Analysis

AILast updated: 07/05/2025, 04:09:34 UTC

Technical Analysis

CVE-2022-43408 is a vulnerability found in the Jenkins Pipeline: Stage View Plugin versions 2.26 and earlier. The issue arises because the plugin does not properly encode the IDs of 'input' steps when generating URLs that allow users to proceed or abort pipeline builds. This improper encoding enables an attacker who has the ability to configure Jenkins pipelines to specify malicious 'input' step IDs. These crafted IDs can produce URLs that bypass Jenkins' Cross-Site Request Forgery (CSRF) protection mechanisms on any target URL within Jenkins. Essentially, this vulnerability allows an attacker to construct URLs that can trick Jenkins into executing unauthorized pipeline actions without proper CSRF validation. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery) and has a CVSS v3.1 base score of 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The impact affects integrity (I:H) but not confidentiality or availability. No known exploits are currently reported in the wild, and no official patches are linked in the provided data. This vulnerability is significant because Jenkins is widely used for continuous integration and continuous deployment (CI/CD) pipelines, and compromising pipeline integrity can lead to unauthorized code execution or deployment, potentially impacting software supply chains.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of their CI/CD pipelines managed through Jenkins. Successful exploitation could allow attackers to bypass CSRF protections and manipulate pipeline executions, potentially injecting malicious code or disrupting deployment workflows. This can lead to compromised software builds, unauthorized changes in production environments, and ultimately, supply chain attacks. Given the widespread adoption of Jenkins in European enterprises, especially in sectors like finance, manufacturing, and technology, the impact could be significant. Organizations relying on automated pipelines for critical software delivery may face operational disruptions and reputational damage if attackers exploit this flaw. Furthermore, the medium severity and the requirement for user interaction mean that phishing or social engineering could be used to facilitate exploitation, increasing the threat surface. However, the absence of known exploits in the wild suggests that immediate widespread exploitation is not confirmed but should not be discounted.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Upgrade the Jenkins Pipeline: Stage View Plugin to a version later than 2.26 where this issue is resolved, or apply any available security patches from the Jenkins project as soon as they are released. 2) Restrict pipeline configuration permissions strictly to trusted users to reduce the risk of malicious pipeline step ID injection. 3) Implement additional monitoring and alerting on pipeline input step URLs and user actions that proceed or abort builds, to detect suspicious activities. 4) Educate users about the risks of phishing and social engineering attacks that could lead to user interaction required for exploitation. 5) Consider deploying Web Application Firewalls (WAFs) or reverse proxies with CSRF protection enhancements to add an additional layer of defense. 6) Regularly audit Jenkins configurations and plugin versions to ensure compliance with security best practices. 7) If upgrading immediately is not feasible, consider disabling or limiting the use of the Stage View Plugin input steps until patched.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2022-10-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd7fdc

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 4:09:34 AM

Last updated: 2/7/2026, 10:52:12 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats