Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64133: Vulnerability in Jenkins Project Jenkins Extensible Choice Parameter Plugin

0
Medium
VulnerabilityCVE-2025-64133cvecve-2025-64133
Published: Wed Oct 29 2025 (10/29/2025, 13:29:41 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins Project
Product: Jenkins Extensible Choice Parameter Plugin

Description

A cross-site request forgery (CSRF) vulnerability in Jenkins Extensible Choice Parameter Plugin 239.v5f5c278708cf and earlier allows attackers to execute sandboxed Groovy code.

AI-Powered Analysis

AILast updated: 11/05/2025, 15:52:03 UTC

Technical Analysis

CVE-2025-64133 identifies a cross-site request forgery (CSRF) vulnerability in the Jenkins Extensible Choice Parameter Plugin, specifically version 239.v5f5c278708cf and earlier. This vulnerability allows an attacker to execute sandboxed Groovy code remotely by tricking a Jenkins user into performing an unintended action via a crafted request. The plugin is used to provide dynamic choice parameters in Jenkins jobs, and the CSRF flaw arises because the plugin fails to properly validate the origin of requests, allowing unauthorized commands to be executed in the context of the Jenkins server. The vulnerability does not require any authentication or privileges (PR:N), but does require user interaction (UI:R), meaning an attacker must convince a user to visit a malicious page or click a crafted link. The attack vector is network-based (AV:N), and the complexity is low (AC:L), indicating ease of exploitation. While confidentiality is not impacted, the integrity and availability of Jenkins jobs and environments can be compromised by executing arbitrary Groovy scripts, potentially leading to unauthorized changes or disruption of CI/CD pipelines. No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery).

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity and availability of Jenkins-based continuous integration and deployment pipelines. Exploitation could allow attackers to execute arbitrary Groovy code within Jenkins, potentially modifying build parameters, injecting malicious code into software builds, or disrupting automated workflows. This could lead to compromised software supply chains, unauthorized code changes, or denial of service conditions in critical development environments. Organizations relying heavily on Jenkins for DevOps automation, especially those in regulated industries such as finance, healthcare, and critical infrastructure, may face operational disruptions and compliance risks. The lack of confidentiality impact reduces the risk of data leakage but does not mitigate the threat to system integrity and availability. The medium CVSS score reflects these concerns, emphasizing the need for timely mitigation to avoid exploitation.

Mitigation Recommendations

Until an official patch is released, European organizations should implement several specific mitigations: 1) Restrict access to Jenkins interfaces by enforcing strict network segmentation and firewall rules to limit exposure to trusted users only. 2) Disable or uninstall the Extensible Choice Parameter Plugin if it is not essential to operations. 3) Enforce multi-factor authentication and strong user access controls to reduce the risk of successful social engineering attacks that enable CSRF exploitation. 4) Educate Jenkins users about the risks of clicking unknown links or visiting untrusted websites while logged into Jenkins. 5) Monitor Jenkins logs for unusual Groovy script executions or unexpected job parameter changes that could indicate exploitation attempts. 6) Prepare for rapid deployment of patches once available by maintaining an up-to-date inventory of Jenkins plugins and versions. 7) Consider implementing web application firewalls (WAFs) with CSRF protection capabilities to detect and block suspicious requests targeting Jenkins endpoints. These measures go beyond generic advice by focusing on access control, user behavior, and proactive monitoring tailored to the Jenkins environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2025-10-28T07:34:37.541Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69021a8414cc779bff050fd2

Added to database: 10/29/2025, 1:45:40 PM

Last enriched: 11/5/2025, 3:52:03 PM

Last updated: 12/14/2025, 2:05:10 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats