CVE-2025-47884: Vulnerability in Jenkins Project Jenkins OpenID Connect Provider Plugin
In Jenkins OpenID Connect Provider Plugin 96.vee8ed882ec4d and earlier the generation of build ID Tokens uses potentially overridden values of environment variables, in conjunction with certain other plugins allowing attackers able to configure jobs to craft a build ID Token that impersonates a trusted job, potentially gaining unauthorized access to external services.
AI Analysis
Technical Summary
CVE-2025-47884 is a critical vulnerability identified in the Jenkins OpenID Connect Provider Plugin, specifically versions 96.vee8ed882ec4d and earlier. The vulnerability arises from the way the plugin generates build ID Tokens by using environment variables that can potentially be overridden. When combined with certain other Jenkins plugins, this flaw allows an attacker who has the ability to configure Jenkins jobs to craft a malicious build ID Token. This token can impersonate a trusted job within the Jenkins environment, thereby potentially gaining unauthorized access to external services that rely on these tokens for authentication or authorization. The vulnerability is classified under CWE-284, indicating an issue with improper access control. The CVSS v3.1 score of 9.1 (critical) reflects the high severity, with an attack vector that is network-based (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), and a scope change (S:C) that affects confidentiality (C:L), integrity (I:H), and availability (A:L). This means that an attacker with some level of privileges on Jenkins can exploit this vulnerability remotely to escalate privileges and compromise the integrity of build processes and external service interactions. Although no known exploits are currently reported in the wild, the potential impact is significant due to the critical nature of Jenkins in continuous integration/continuous deployment (CI/CD) pipelines and the reliance on OpenID Connect tokens for secure authentication.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those heavily reliant on Jenkins for their software development lifecycle and CI/CD automation. Exploitation could lead to unauthorized access to external services integrated with Jenkins, such as cloud platforms, artifact repositories, or deployment environments, potentially resulting in data breaches, unauthorized code deployments, or service disruptions. The integrity of build artifacts could be compromised, leading to the introduction of malicious code into production environments. Confidentiality is also at risk, as attackers could access sensitive environment variables or tokenized credentials. Given the critical role of Jenkins in many industries including finance, manufacturing, and telecommunications across Europe, exploitation could disrupt business operations and damage trust with customers and partners. The scope of impact extends beyond the Jenkins server itself to any external systems trusting the compromised tokens, amplifying the potential damage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit their Jenkins environments to identify usage of the OpenID Connect Provider Plugin and determine the plugin version in use. Upgrading to a patched version once available is paramount. Until a patch is released, organizations should restrict job configuration permissions to trusted administrators only, minimizing the risk that an attacker can create or modify jobs to exploit the vulnerability. Implement strict environment variable controls and validation to prevent unauthorized overrides. Additionally, review and limit the scope of external services that accept build ID Tokens for authentication, applying the principle of least privilege. Employ network segmentation and monitoring to detect anomalous token usage or job configurations. Organizations should also consider integrating additional authentication layers or token validation mechanisms external to Jenkins to reduce reliance on potentially compromised tokens. Regularly review Jenkins audit logs for suspicious job creation or token generation activities. Finally, coordinate with security teams to prepare incident response plans specific to CI/CD pipeline compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-47884: Vulnerability in Jenkins Project Jenkins OpenID Connect Provider Plugin
Description
In Jenkins OpenID Connect Provider Plugin 96.vee8ed882ec4d and earlier the generation of build ID Tokens uses potentially overridden values of environment variables, in conjunction with certain other plugins allowing attackers able to configure jobs to craft a build ID Token that impersonates a trusted job, potentially gaining unauthorized access to external services.
AI-Powered Analysis
Technical Analysis
CVE-2025-47884 is a critical vulnerability identified in the Jenkins OpenID Connect Provider Plugin, specifically versions 96.vee8ed882ec4d and earlier. The vulnerability arises from the way the plugin generates build ID Tokens by using environment variables that can potentially be overridden. When combined with certain other Jenkins plugins, this flaw allows an attacker who has the ability to configure Jenkins jobs to craft a malicious build ID Token. This token can impersonate a trusted job within the Jenkins environment, thereby potentially gaining unauthorized access to external services that rely on these tokens for authentication or authorization. The vulnerability is classified under CWE-284, indicating an issue with improper access control. The CVSS v3.1 score of 9.1 (critical) reflects the high severity, with an attack vector that is network-based (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), and a scope change (S:C) that affects confidentiality (C:L), integrity (I:H), and availability (A:L). This means that an attacker with some level of privileges on Jenkins can exploit this vulnerability remotely to escalate privileges and compromise the integrity of build processes and external service interactions. Although no known exploits are currently reported in the wild, the potential impact is significant due to the critical nature of Jenkins in continuous integration/continuous deployment (CI/CD) pipelines and the reliance on OpenID Connect tokens for secure authentication.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those heavily reliant on Jenkins for their software development lifecycle and CI/CD automation. Exploitation could lead to unauthorized access to external services integrated with Jenkins, such as cloud platforms, artifact repositories, or deployment environments, potentially resulting in data breaches, unauthorized code deployments, or service disruptions. The integrity of build artifacts could be compromised, leading to the introduction of malicious code into production environments. Confidentiality is also at risk, as attackers could access sensitive environment variables or tokenized credentials. Given the critical role of Jenkins in many industries including finance, manufacturing, and telecommunications across Europe, exploitation could disrupt business operations and damage trust with customers and partners. The scope of impact extends beyond the Jenkins server itself to any external systems trusting the compromised tokens, amplifying the potential damage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit their Jenkins environments to identify usage of the OpenID Connect Provider Plugin and determine the plugin version in use. Upgrading to a patched version once available is paramount. Until a patch is released, organizations should restrict job configuration permissions to trusted administrators only, minimizing the risk that an attacker can create or modify jobs to exploit the vulnerability. Implement strict environment variable controls and validation to prevent unauthorized overrides. Additionally, review and limit the scope of external services that accept build ID Tokens for authentication, applying the principle of least privilege. Employ network segmentation and monitoring to detect anomalous token usage or job configurations. Organizations should also consider integrating additional authentication layers or token validation mechanisms external to Jenkins to reduce reliance on potentially compromised tokens. Regularly review Jenkins audit logs for suspicious job creation or token generation activities. Finally, coordinate with security teams to prepare incident response plans specific to CI/CD pipeline compromises.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2025-05-13T12:21:13.540Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec754
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 12:12:11 PM
Last updated: 1/7/2026, 4:22:07 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.