opensearch-build icon indicating copy to clipboard operation
opensearch-build copied to clipboard

CVE-2025-27624 (Medium) detected in jenkins-core-2.426.3.jar

Open mend-for-github-com[bot] opened this issue 8 months ago • 1 comments

CVE-2025-27624 - Medium Severity Vulnerability

Vulnerable Library - jenkins-core-2.426.3.jar

Jenkins core code and view files to render HTML.

Library home page: https://github.com/jenkinsci/jenkins

Path to dependency file: /build.gradle

Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.main/jenkins-core/2.426.3/eee94c4c0c78e715d2a599eb66a5a89c5eed9d18/jenkins-core-2.426.3.jar

Dependency Hierarchy:

  • :x: jenkins-core-2.426.3.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

A cross-site request forgery (CSRF) vulnerability in Jenkins 2.499 and earlier, LTS 2.492.1 and earlier allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets).

Publish Date: 2025-03-05

URL: CVE-2025-27624

CVSS 3 Score Details (5.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: Low
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3498

Release Date: 2025-03-05

Fix Resolution: jenkins-2.492.2


  • [ ] Check this box to open an automated fix PR