First published: Wed May 14 2025(Updated: )
In Jenkins OpenID Connect Provider Plugin 96.vee8ed882ec4d and earlier the generation of build ID Tokens uses potentially overridden values of environment variables, in conjunction with certain other plugins allowing attackers able to configure jobs to craft a build ID Token that impersonates a trusted job, potentially gaining unauthorized access to external services.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins OpenID Connect Provider Plugin | <=96.vee8ed882ec4d | |
maven/io.jenkins.plugins:oidc-provider | <111.v29fd614b3617 | 111.v29fd614b_3617 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-47884 is considered a high severity vulnerability due to the potential for unauthorized impersonation.
To fix CVE-2025-47884, upgrade to Jenkins OpenID Connect Provider Plugin version 97 or later.
CVE-2025-47884 can allow attackers to craft a build ID Token that impersonates a trusted entity if not mitigated.
CVE-2025-47884 affects Jenkins OpenID Connect Provider Plugin version 96.vee8ed882ec4d and earlier.
Currently, there are no known workarounds for CVE-2025-47884, and updating is recommended.