First published: Wed May 14 2025(Updated: )
Missing permission checks in Jenkins Cadence vManager Plugin 4.0.1-286.v9e25a_740b_a_48 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cadence vManager Plugin | <=4.0.1-286.v9e25a_740b_a_48 | |
maven/org.jenkins-ci.plugins:vmanager-plugin | <4.0.1-288.v8804beaacb7f | 4.0.1-288.v8804b_ea_a_cb_7f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-47887 has a high severity rating due to the potential for unauthorized access to sensitive information.
To fix CVE-2025-47887, upgrade to the latest version of the Jenkins Cadence vManager Plugin that addresses the missing permission checks.
Users of Jenkins Cadence vManager Plugin version 4.0.1-286.v9e25a_740b_a_48 and earlier are affected by CVE-2025-47887.
CVE-2025-47887 exposes the application to risks from attackers who can leverage Overall/Read permissions to connect to arbitrary URLs.
As of now, there are no widely verified exploits publicly reported for CVE-2025-47887, but the vulnerability itself poses a significant risk.