CVE-2025-64133: Vulnerability in Jenkins Project Jenkins Extensible Choice Parameter Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Extensible Choice Parameter Plugin 239.v5f5c278708cf and earlier allows attackers to execute sandboxed Groovy code.
AI Analysis
Technical Summary
CVE-2025-64133 identifies a cross-site request forgery (CSRF) vulnerability in the Jenkins Extensible Choice Parameter Plugin, specifically version 239.v5f5c278708cf and earlier. This vulnerability allows an attacker to execute sandboxed Groovy code remotely by tricking a Jenkins user into performing an unintended action via a crafted request. The plugin is used to provide dynamic choice parameters in Jenkins jobs, and the CSRF flaw arises because the plugin fails to properly validate the origin of requests, allowing unauthorized commands to be executed in the context of the Jenkins server. The vulnerability does not require any authentication or privileges (PR:N), but does require user interaction (UI:R), meaning an attacker must convince a user to visit a malicious page or click a crafted link. The attack vector is network-based (AV:N), and the complexity is low (AC:L), indicating ease of exploitation. While confidentiality is not impacted, the integrity and availability of Jenkins jobs and environments can be compromised by executing arbitrary Groovy scripts, potentially leading to unauthorized changes or disruption of CI/CD pipelines. No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery).
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity and availability of Jenkins-based continuous integration and deployment pipelines. Exploitation could allow attackers to execute arbitrary Groovy code within Jenkins, potentially modifying build parameters, injecting malicious code into software builds, or disrupting automated workflows. This could lead to compromised software supply chains, unauthorized code changes, or denial of service conditions in critical development environments. Organizations relying heavily on Jenkins for DevOps automation, especially those in regulated industries such as finance, healthcare, and critical infrastructure, may face operational disruptions and compliance risks. The lack of confidentiality impact reduces the risk of data leakage but does not mitigate the threat to system integrity and availability. The medium CVSS score reflects these concerns, emphasizing the need for timely mitigation to avoid exploitation.
Mitigation Recommendations
Until an official patch is released, European organizations should implement several specific mitigations: 1) Restrict access to Jenkins interfaces by enforcing strict network segmentation and firewall rules to limit exposure to trusted users only. 2) Disable or uninstall the Extensible Choice Parameter Plugin if it is not essential to operations. 3) Enforce multi-factor authentication and strong user access controls to reduce the risk of successful social engineering attacks that enable CSRF exploitation. 4) Educate Jenkins users about the risks of clicking unknown links or visiting untrusted websites while logged into Jenkins. 5) Monitor Jenkins logs for unusual Groovy script executions or unexpected job parameter changes that could indicate exploitation attempts. 6) Prepare for rapid deployment of patches once available by maintaining an up-to-date inventory of Jenkins plugins and versions. 7) Consider implementing web application firewalls (WAFs) with CSRF protection capabilities to detect and block suspicious requests targeting Jenkins endpoints. These measures go beyond generic advice by focusing on access control, user behavior, and proactive monitoring tailored to the Jenkins environment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-64133: Vulnerability in Jenkins Project Jenkins Extensible Choice Parameter Plugin
Description
A cross-site request forgery (CSRF) vulnerability in Jenkins Extensible Choice Parameter Plugin 239.v5f5c278708cf and earlier allows attackers to execute sandboxed Groovy code.
AI-Powered Analysis
Technical Analysis
CVE-2025-64133 identifies a cross-site request forgery (CSRF) vulnerability in the Jenkins Extensible Choice Parameter Plugin, specifically version 239.v5f5c278708cf and earlier. This vulnerability allows an attacker to execute sandboxed Groovy code remotely by tricking a Jenkins user into performing an unintended action via a crafted request. The plugin is used to provide dynamic choice parameters in Jenkins jobs, and the CSRF flaw arises because the plugin fails to properly validate the origin of requests, allowing unauthorized commands to be executed in the context of the Jenkins server. The vulnerability does not require any authentication or privileges (PR:N), but does require user interaction (UI:R), meaning an attacker must convince a user to visit a malicious page or click a crafted link. The attack vector is network-based (AV:N), and the complexity is low (AC:L), indicating ease of exploitation. While confidentiality is not impacted, the integrity and availability of Jenkins jobs and environments can be compromised by executing arbitrary Groovy scripts, potentially leading to unauthorized changes or disruption of CI/CD pipelines. No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery).
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity and availability of Jenkins-based continuous integration and deployment pipelines. Exploitation could allow attackers to execute arbitrary Groovy code within Jenkins, potentially modifying build parameters, injecting malicious code into software builds, or disrupting automated workflows. This could lead to compromised software supply chains, unauthorized code changes, or denial of service conditions in critical development environments. Organizations relying heavily on Jenkins for DevOps automation, especially those in regulated industries such as finance, healthcare, and critical infrastructure, may face operational disruptions and compliance risks. The lack of confidentiality impact reduces the risk of data leakage but does not mitigate the threat to system integrity and availability. The medium CVSS score reflects these concerns, emphasizing the need for timely mitigation to avoid exploitation.
Mitigation Recommendations
Until an official patch is released, European organizations should implement several specific mitigations: 1) Restrict access to Jenkins interfaces by enforcing strict network segmentation and firewall rules to limit exposure to trusted users only. 2) Disable or uninstall the Extensible Choice Parameter Plugin if it is not essential to operations. 3) Enforce multi-factor authentication and strong user access controls to reduce the risk of successful social engineering attacks that enable CSRF exploitation. 4) Educate Jenkins users about the risks of clicking unknown links or visiting untrusted websites while logged into Jenkins. 5) Monitor Jenkins logs for unusual Groovy script executions or unexpected job parameter changes that could indicate exploitation attempts. 6) Prepare for rapid deployment of patches once available by maintaining an up-to-date inventory of Jenkins plugins and versions. 7) Consider implementing web application firewalls (WAFs) with CSRF protection capabilities to detect and block suspicious requests targeting Jenkins endpoints. These measures go beyond generic advice by focusing on access control, user behavior, and proactive monitoring tailored to the Jenkins environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2025-10-28T07:34:37.541Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69021a8414cc779bff050fd2
Added to database: 10/29/2025, 1:45:40 PM
Last enriched: 11/5/2025, 3:52:03 PM
Last updated: 12/14/2025, 2:05:10 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14662: Cross Site Scripting in code-projects Student File Management System
MediumCVE-2025-14660: Improper Access Controls in DecoCMS Mesh
MediumCVE-2025-14661: SQL Injection in itsourcecode Student Managemen System
MediumCVE-2025-14659: Command Injection in D-Link DIR-860LB1
HighCVE-2025-14656: Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.