Arbitrary Code Execution Vulnerability in Jenkins Templating Engine Plugin
CVE-2025-31722
8.8HIGH
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 2 April 2025
Badges
๐พ Exploit Exists๐ก Public PoC
What is CVE-2025-31722?
In the Jenkins Templating Engine Plugin prior to version 2.5.4, the lack of sandbox protection for libraries defined in folders poses a significant risk. Attackers with Item/Configure permissions can exploit this vulnerability to execute arbitrary code within the Jenkins controller JVM. This vulnerability can lead to unauthorized actions and system compromise, making it essential for users to update to the latest version to mitigate risks.
Affected Version(s)
Jenkins Templating Engine Plugin 0 <= 2.5.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.