First published: Wed Jan 22 2025(Updated: )
An extension point in Jenkins allows selectively disabling cross-site request forgery (CSRF) protection for specific URLs. Bitbucket Server Integration Plugin implements this extension point to support OAuth 1.0 authentication. In Bitbucket Server Integration Plugin 2.1.0 through 4.1.3 (both inclusive) this implementation is too permissive, allowing attackers to craft URLs that would bypass the CSRF protection of any target URL. Bitbucket Server Integration Plugin 4.1.4 restricts which URLs it disables cross-site request forgery (CSRF) protection for to the URLs that needs it.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins.plugins:atlassian-bitbucket-server-integration | >=2.1.0<4.1.4 | 4.1.4 |
Jenkins Bitbucket OAuth | >=2.1.0<=4.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24398 is a high-severity vulnerability due to its potential impact on cross-site request forgery (CSRF) protection.
To fix CVE-2025-24398, upgrade the Bitbucket Server Integration Plugin to version 4.1.4 or later.
Versions 2.1.0 through 4.1.3 of the Bitbucket Server Integration Plugin are affected by CVE-2025-24398.
CVE-2025-24398 is a type of vulnerability that allows selective disabling of CSRF protection for specific URLs.
Yes, CVE-2025-24398 specifically impacts the Jenkins Bitbucket Server Integration Plugin.