Skip to main content

CVE-2025-47884: Vulnerability in Jenkins Project Jenkins OpenID Connect Provider Plugin

Critical
VulnerabilityCVE-2025-47884cvecve-2025-47884
Published: Wed May 14 2025 (05/14/2025, 20:35:54 UTC)
Source: CVE
Vendor/Project: Jenkins Project
Product: Jenkins OpenID Connect Provider Plugin

Description

In Jenkins OpenID Connect Provider Plugin 96.vee8ed882ec4d and earlier the generation of build ID Tokens uses potentially overridden values of environment variables, in conjunction with certain other plugins allowing attackers able to configure jobs to craft a build ID Token that impersonates a trusted job, potentially gaining unauthorized access to external services.

AI-Powered Analysis

AILast updated: 07/06/2025, 12:12:11 UTC

Technical Analysis

CVE-2025-47884 is a critical vulnerability identified in the Jenkins OpenID Connect Provider Plugin, specifically versions 96.vee8ed882ec4d and earlier. The vulnerability arises from the way the plugin generates build ID Tokens by using environment variables that can potentially be overridden. When combined with certain other Jenkins plugins, this flaw allows an attacker who has the ability to configure Jenkins jobs to craft a malicious build ID Token. This token can impersonate a trusted job within the Jenkins environment, thereby potentially gaining unauthorized access to external services that rely on these tokens for authentication or authorization. The vulnerability is classified under CWE-284, indicating an issue with improper access control. The CVSS v3.1 score of 9.1 (critical) reflects the high severity, with an attack vector that is network-based (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), and a scope change (S:C) that affects confidentiality (C:L), integrity (I:H), and availability (A:L). This means that an attacker with some level of privileges on Jenkins can exploit this vulnerability remotely to escalate privileges and compromise the integrity of build processes and external service interactions. Although no known exploits are currently reported in the wild, the potential impact is significant due to the critical nature of Jenkins in continuous integration/continuous deployment (CI/CD) pipelines and the reliance on OpenID Connect tokens for secure authentication.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those heavily reliant on Jenkins for their software development lifecycle and CI/CD automation. Exploitation could lead to unauthorized access to external services integrated with Jenkins, such as cloud platforms, artifact repositories, or deployment environments, potentially resulting in data breaches, unauthorized code deployments, or service disruptions. The integrity of build artifacts could be compromised, leading to the introduction of malicious code into production environments. Confidentiality is also at risk, as attackers could access sensitive environment variables or tokenized credentials. Given the critical role of Jenkins in many industries including finance, manufacturing, and telecommunications across Europe, exploitation could disrupt business operations and damage trust with customers and partners. The scope of impact extends beyond the Jenkins server itself to any external systems trusting the compromised tokens, amplifying the potential damage.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit their Jenkins environments to identify usage of the OpenID Connect Provider Plugin and determine the plugin version in use. Upgrading to a patched version once available is paramount. Until a patch is released, organizations should restrict job configuration permissions to trusted administrators only, minimizing the risk that an attacker can create or modify jobs to exploit the vulnerability. Implement strict environment variable controls and validation to prevent unauthorized overrides. Additionally, review and limit the scope of external services that accept build ID Tokens for authentication, applying the principle of least privilege. Employ network segmentation and monitoring to detect anomalous token usage or job configurations. Organizations should also consider integrating additional authentication layers or token validation mechanisms external to Jenkins to reduce reliance on potentially compromised tokens. Regularly review Jenkins audit logs for suspicious job creation or token generation activities. Finally, coordinate with security teams to prepare incident response plans specific to CI/CD pipeline compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2025-05-13T12:21:13.540Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec754

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 12:12:11 PM

Last updated: 8/11/2025, 11:45:16 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats