Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13472: CWE-862 Missing Authorization in Perforce BlazeMeter

0
Medium
VulnerabilityCVE-2025-13472cvecve-2025-13472cwe-862
Published: Wed Dec 03 2025 (12/03/2025, 08:42:27 UTC)
Source: CVE Database V5
Vendor/Project: Perforce
Product: BlazeMeter

Description

A fix was made in BlazeMeter Jenkins Plugin version 4.27 to allow users only with certain permissions to see the list of available resources like credential IDs, bzm workspaces and bzm project Ids. Prior to this fix, anyone could see this list as a dropdown on the Jenkins UI.

AI-Powered Analysis

AILast updated: 12/10/2025, 09:11:39 UTC

Technical Analysis

CVE-2025-13472 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Perforce BlazeMeter Jenkins Plugin prior to version 4.27. The flaw allowed any Jenkins user, regardless of their permission level, to view lists of sensitive resources including credential IDs, BlazeMeter workspaces, and project IDs through dropdown menus in the Jenkins user interface. This unauthorized information disclosure arises because the plugin did not enforce proper authorization checks before displaying these resources. The vulnerability impacts confidentiality by exposing potentially sensitive identifiers that could be leveraged for further attacks such as credential theft or unauthorized access to BlazeMeter projects. The vulnerability does not require user interaction and can be exploited remotely by any user with access to the Jenkins UI, even with low privileges. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. The issue was addressed in BlazeMeter Jenkins Plugin version 4.27 by restricting visibility of these resources to users with appropriate permissions. No public exploits or active exploitation have been reported to date. This vulnerability is particularly relevant for organizations using Jenkins for continuous integration and BlazeMeter for performance testing, as it could facilitate reconnaissance and lateral movement within development environments.

Potential Impact

For European organizations, the primary impact of CVE-2025-13472 is unauthorized disclosure of sensitive resource identifiers within Jenkins environments integrated with BlazeMeter. This information leakage could enable attackers or malicious insiders to map out credential IDs and project structures, potentially aiding in subsequent targeted attacks such as credential compromise or unauthorized project access. While the vulnerability does not directly allow code execution or system takeover, the exposure of credential IDs and workspace information undermines the confidentiality of the CI/CD pipeline and associated testing infrastructure. Organizations in sectors with high reliance on software development and automated testing, such as finance, telecommunications, and manufacturing, could face increased risk if attackers leverage this information for lateral movement or supply chain attacks. The medium severity rating reflects the limited scope of impact but acknowledges the potential for escalation if combined with other vulnerabilities or insider threats. Additionally, regulatory requirements under GDPR emphasize protecting sensitive data, and unauthorized exposure of credentials or project information could lead to compliance issues or reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-13472, organizations should immediately upgrade the BlazeMeter Jenkins Plugin to version 4.27 or later, where proper authorization checks have been implemented. Beyond patching, administrators should audit Jenkins user permissions to ensure that only trusted users have access to sensitive plugins and resources. Implement role-based access control (RBAC) within Jenkins to restrict visibility and modification rights to credential IDs and project configurations. Regularly review Jenkins audit logs for unusual access patterns or attempts to enumerate resources. Network segmentation can limit access to Jenkins servers to authorized personnel only, reducing exposure to unauthorized users. Additionally, consider integrating Jenkins with centralized identity and access management (IAM) solutions to enforce consistent authentication and authorization policies. Conduct security awareness training for developers and DevOps teams to recognize the importance of least privilege principles in CI/CD environments. Finally, monitor vendor advisories for any updates or related vulnerabilities in BlazeMeter or Jenkins plugins.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Perforce
Date Reserved
2025-11-20T11:26:48.612Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692ffe297fb5593475bc861f

Added to database: 12/3/2025, 9:08:57 AM

Last enriched: 12/10/2025, 9:11:39 AM

Last updated: 1/17/2026, 9:07:22 PM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats