First published: Wed Mar 05 2025(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.499 and earlier, LTS 2.492.1 and earlier allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets).
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins LTS | <2.500 | |
Jenkins | <2.492.2 | |
maven/org.jenkins-ci.main:jenkins-core | <2.492.2 | 2.492.2 |
maven/org.jenkins-ci.main:jenkins-core | >=2.493<2.500 | 2.500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-27624 is considered moderate due to its potential to affect user interface settings in Jenkins.
To fix CVE-2025-27624, upgrade to Jenkins version 2.500 or later, or Jenkins LTS version 2.492.2 or later.
CVE-2025-27624 affects Jenkins 2.499 and earlier, as well as Jenkins LTS 2.492.1 and earlier.
The impact of CVE-2025-27624 allows attackers to manipulate the collapsed/expanded status of sidepanel widgets through CSRF.
Any users of Jenkins versions 2.499 and earlier or Jenkins LTS versions 2.492.1 and earlier may be affected by CVE-2025-27624.