opensearch-build
opensearch-build copied to clipboard
CVE-2025-27624 (Medium) detected in jenkins-core-2.426.3.jar
CVE-2025-27624 - Medium Severity Vulnerability
Vulnerable Library - jenkins-core-2.426.3.jar
Jenkins core code and view files to render HTML.
Library home page: https://github.com/jenkinsci/jenkins
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.main/jenkins-core/2.426.3/eee94c4c0c78e715d2a599eb66a5a89c5eed9d18/jenkins-core-2.426.3.jar
Dependency Hierarchy:
- :x: jenkins-core-2.426.3.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.499 and earlier, LTS 2.492.1 and earlier allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets).
Publish Date: 2025-03-05
URL: CVE-2025-27624
CVSS 3 Score Details (5.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3498
Release Date: 2025-03-05
Fix Resolution: jenkins-2.492.2
- [ ] Check this box to open an automated fix PR