First published: Wed Apr 02 2025(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Simple Queue Plugin 1.4.6 and earlier allows attackers to change and reset the build queue order.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins.plugins:simple-queue | <1.4.7 | 1.4.7 |
Jenkins Simple Queue | <1.4.7 | |
Jenkins Simple Queue | <1.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-31723 is classified as a medium severity cross-site request forgery (CSRF) vulnerability.
To fix CVE-2025-31723, upgrade to Jenkins Simple Queue Plugin version 1.4.7 or later.
CVE-2025-31723 affects Jenkins Simple Queue Plugin versions 1.4.6 and earlier.
Due to CVE-2025-31723, attackers can exploit the CSRF vulnerability to change and reset the build queue order.
There are no official workarounds for CVE-2025-31723; upgrading the plugin is recommended.