First published: Wed Apr 02 2025(Updated: )
In Jenkins Templating Engine Plugin 2.5.3 and earlier, libraries defined in folders are not subject to sandbox protection, allowing attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Templating Engine Plugin | <2.5.3 | |
maven/org.jenkins-ci.plugins:templating-engine | <2.5.4 | 2.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-31722 is classified as a critical vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2025-31722, upgrade the Jenkins Templating Engine Plugin to version 2.5.4 or later.
An attacker needs Item/Configure permission to exploit CVE-2025-31722.
CVE-2025-31722 affects Jenkins Templating Engine Plugin versions up to and including 2.5.3.
CVE-2025-31722 poses a risk of arbitrary code execution in the Jenkins controller JVM, compromising the entire system.