CVE-2025-13472: CWE-862 Missing Authorization in Perforce BlazeMeter
A fix was made in BlazeMeter Jenkins Plugin version 4.27 to allow users only with certain permissions to see the list of available resources like credential IDs, bzm workspaces and bzm project Ids. Prior to this fix, anyone could see this list as a dropdown on the Jenkins UI.
AI Analysis
Technical Summary
CVE-2025-13472 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Perforce BlazeMeter Jenkins Plugin prior to version 4.27. The flaw allowed any Jenkins user, regardless of their permission level, to view lists of sensitive resources including credential IDs, BlazeMeter workspaces, and project IDs through dropdown menus in the Jenkins user interface. This unauthorized information disclosure arises because the plugin did not enforce proper authorization checks before displaying these resources. The vulnerability impacts confidentiality by exposing potentially sensitive identifiers that could be leveraged for further attacks such as credential theft or unauthorized access to BlazeMeter projects. The vulnerability does not require user interaction and can be exploited remotely by any user with access to the Jenkins UI, even with low privileges. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. The issue was addressed in BlazeMeter Jenkins Plugin version 4.27 by restricting visibility of these resources to users with appropriate permissions. No public exploits or active exploitation have been reported to date. This vulnerability is particularly relevant for organizations using Jenkins for continuous integration and BlazeMeter for performance testing, as it could facilitate reconnaissance and lateral movement within development environments.
Potential Impact
For European organizations, the primary impact of CVE-2025-13472 is unauthorized disclosure of sensitive resource identifiers within Jenkins environments integrated with BlazeMeter. This information leakage could enable attackers or malicious insiders to map out credential IDs and project structures, potentially aiding in subsequent targeted attacks such as credential compromise or unauthorized project access. While the vulnerability does not directly allow code execution or system takeover, the exposure of credential IDs and workspace information undermines the confidentiality of the CI/CD pipeline and associated testing infrastructure. Organizations in sectors with high reliance on software development and automated testing, such as finance, telecommunications, and manufacturing, could face increased risk if attackers leverage this information for lateral movement or supply chain attacks. The medium severity rating reflects the limited scope of impact but acknowledges the potential for escalation if combined with other vulnerabilities or insider threats. Additionally, regulatory requirements under GDPR emphasize protecting sensitive data, and unauthorized exposure of credentials or project information could lead to compliance issues or reputational damage.
Mitigation Recommendations
To mitigate CVE-2025-13472, organizations should immediately upgrade the BlazeMeter Jenkins Plugin to version 4.27 or later, where proper authorization checks have been implemented. Beyond patching, administrators should audit Jenkins user permissions to ensure that only trusted users have access to sensitive plugins and resources. Implement role-based access control (RBAC) within Jenkins to restrict visibility and modification rights to credential IDs and project configurations. Regularly review Jenkins audit logs for unusual access patterns or attempts to enumerate resources. Network segmentation can limit access to Jenkins servers to authorized personnel only, reducing exposure to unauthorized users. Additionally, consider integrating Jenkins with centralized identity and access management (IAM) solutions to enforce consistent authentication and authorization policies. Conduct security awareness training for developers and DevOps teams to recognize the importance of least privilege principles in CI/CD environments. Finally, monitor vendor advisories for any updates or related vulnerabilities in BlazeMeter or Jenkins plugins.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-13472: CWE-862 Missing Authorization in Perforce BlazeMeter
Description
A fix was made in BlazeMeter Jenkins Plugin version 4.27 to allow users only with certain permissions to see the list of available resources like credential IDs, bzm workspaces and bzm project Ids. Prior to this fix, anyone could see this list as a dropdown on the Jenkins UI.
AI-Powered Analysis
Technical Analysis
CVE-2025-13472 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Perforce BlazeMeter Jenkins Plugin prior to version 4.27. The flaw allowed any Jenkins user, regardless of their permission level, to view lists of sensitive resources including credential IDs, BlazeMeter workspaces, and project IDs through dropdown menus in the Jenkins user interface. This unauthorized information disclosure arises because the plugin did not enforce proper authorization checks before displaying these resources. The vulnerability impacts confidentiality by exposing potentially sensitive identifiers that could be leveraged for further attacks such as credential theft or unauthorized access to BlazeMeter projects. The vulnerability does not require user interaction and can be exploited remotely by any user with access to the Jenkins UI, even with low privileges. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. The issue was addressed in BlazeMeter Jenkins Plugin version 4.27 by restricting visibility of these resources to users with appropriate permissions. No public exploits or active exploitation have been reported to date. This vulnerability is particularly relevant for organizations using Jenkins for continuous integration and BlazeMeter for performance testing, as it could facilitate reconnaissance and lateral movement within development environments.
Potential Impact
For European organizations, the primary impact of CVE-2025-13472 is unauthorized disclosure of sensitive resource identifiers within Jenkins environments integrated with BlazeMeter. This information leakage could enable attackers or malicious insiders to map out credential IDs and project structures, potentially aiding in subsequent targeted attacks such as credential compromise or unauthorized project access. While the vulnerability does not directly allow code execution or system takeover, the exposure of credential IDs and workspace information undermines the confidentiality of the CI/CD pipeline and associated testing infrastructure. Organizations in sectors with high reliance on software development and automated testing, such as finance, telecommunications, and manufacturing, could face increased risk if attackers leverage this information for lateral movement or supply chain attacks. The medium severity rating reflects the limited scope of impact but acknowledges the potential for escalation if combined with other vulnerabilities or insider threats. Additionally, regulatory requirements under GDPR emphasize protecting sensitive data, and unauthorized exposure of credentials or project information could lead to compliance issues or reputational damage.
Mitigation Recommendations
To mitigate CVE-2025-13472, organizations should immediately upgrade the BlazeMeter Jenkins Plugin to version 4.27 or later, where proper authorization checks have been implemented. Beyond patching, administrators should audit Jenkins user permissions to ensure that only trusted users have access to sensitive plugins and resources. Implement role-based access control (RBAC) within Jenkins to restrict visibility and modification rights to credential IDs and project configurations. Regularly review Jenkins audit logs for unusual access patterns or attempts to enumerate resources. Network segmentation can limit access to Jenkins servers to authorized personnel only, reducing exposure to unauthorized users. Additionally, consider integrating Jenkins with centralized identity and access management (IAM) solutions to enforce consistent authentication and authorization policies. Conduct security awareness training for developers and DevOps teams to recognize the importance of least privilege principles in CI/CD environments. Finally, monitor vendor advisories for any updates or related vulnerabilities in BlazeMeter or Jenkins plugins.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Perforce
- Date Reserved
- 2025-11-20T11:26:48.612Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692ffe297fb5593475bc861f
Added to database: 12/3/2025, 9:08:57 AM
Last enriched: 12/10/2025, 9:11:39 AM
Last updated: 1/17/2026, 9:07:22 PM
Views: 116
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1064: Command Injection in bastillion-io Bastillion
MediumCVE-2026-1063: Command Injection in bastillion-io Bastillion
MediumCVE-2026-1062: Server-Side Request Forgery in xiweicheng TMS
MediumCVE-2026-1061: Unrestricted Upload in xiweicheng TMS
MediumCVE-2026-1050: SQL Injection in risesoft-y9 Digital-Infrastructure
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.