Headline
GHSA-7g95-jmg9-h524: Jenkins cross-site request forgery (CSRF) vulnerability
Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not require POST requests for the HTTP endpoint toggling collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets), resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets.
Additionally, as the API accepts any string as the identifier of the panel ID to be toggled, attacker-controlled content can be stored in the victim’s user profile in Jenkins.
Jenkins 2.500, LTS 2.492.2 requires POST requests for the affected HTTP endpoint.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-27624
Jenkins cross-site request forgery (CSRF) vulnerability
Moderate severity GitHub Reviewed Published Mar 6, 2025 to the GitHub Advisory Database • Updated Mar 6, 2025
Package
maven org.jenkins-ci.main:jenkins-core (Maven)
Affected versions
>= 2.493, < 2.500
< 2.492.2
Patched versions
2.500
2.492.2
Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not require POST requests for the HTTP endpoint toggling collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets), resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets.
Additionally, as the API accepts any string as the identifier of the panel ID to be toggled, attacker-controlled content can be stored in the victim’s user profile in Jenkins.
Jenkins 2.500, LTS 2.492.2 requires POST requests for the affected HTTP endpoint.
References
- https://nvd.nist.gov/vuln/detail/CVE-2025-27624
- https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3498
- jenkinsci/jenkins@84ef1a4
Published to the GitHub Advisory Database
Mar 6, 2025