Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-7g95-jmg9-h524: Jenkins cross-site request forgery (CSRF) vulnerability

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not require POST requests for the HTTP endpoint toggling collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets), resulting in a cross-site request forgery (CSRF) vulnerability.

This vulnerability allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets.

Additionally, as the API accepts any string as the identifier of the panel ID to be toggled, attacker-controlled content can be stored in the victim’s user profile in Jenkins.

Jenkins 2.500, LTS 2.492.2 requires POST requests for the affected HTTP endpoint.

ghsa
#csrf#vulnerability#git#java#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-27624

Jenkins cross-site request forgery (CSRF) vulnerability

Moderate severity GitHub Reviewed Published Mar 6, 2025 to the GitHub Advisory Database • Updated Mar 6, 2025

Package

maven org.jenkins-ci.main:jenkins-core (Maven)

Affected versions

>= 2.493, < 2.500

< 2.492.2

Patched versions

2.500

2.492.2

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not require POST requests for the HTTP endpoint toggling collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets), resulting in a cross-site request forgery (CSRF) vulnerability.

This vulnerability allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets.

Additionally, as the API accepts any string as the identifier of the panel ID to be toggled, attacker-controlled content can be stored in the victim’s user profile in Jenkins.

Jenkins 2.500, LTS 2.492.2 requires POST requests for the affected HTTP endpoint.

References

  • https://nvd.nist.gov/vuln/detail/CVE-2025-27624
  • https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3498
  • jenkinsci/jenkins@84ef1a4

Published to the GitHub Advisory Database

Mar 6, 2025

ghsa: Latest News

GHSA-vc29-vg52-6643: DoS Vulnerability in TraceContextPropagator.Extract - OpenTelemetry.Api