Token Impersonation Vulnerability in Jenkins OpenID Connect Provider Plugin
CVE-2025-47884
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 14 May 2025
What is CVE-2025-47884?
CVE-2025-47884 is a vulnerability in the Jenkins OpenID Connect Provider Plugin, specifically affecting versions 96.vee8ed882ec4d and earlier. Jenkins is a widely used open-source automation server that supports continuous integration and continuous delivery (CI/CD) processes in software development. This vulnerability arises from the way build ID Tokens are generated, as it allows environment variable values to be overridden in certain contexts. As a result, an attacker with the ability to configure jobs within Jenkins can forge a build ID Token that mimics a trusted job. Consequently, this can lead to unauthorized access to external services, exposing organizations to significant security risks.
Potential impact of CVE-2025-47884
-
Unauthorized Access: The most immediate concern is that attackers can impersonate trusted jobs, potentially accessing sensitive data and external systems without authorization. This breach could lead to significant data loss or exposure.
-
Compromised External Services: With the ability to generate misleading tokens, attackers might exploit linked external services that rely on Jenkins for authentication, leading to broader security breaches beyond the Jenkins environment.
-
Impact on CI/CD Processes: This vulnerability could undermine the integrity of the CI/CD pipelines by allowing malicious alterations in the build or deployment processes. Such manipulations could result in deploying compromised code into production environments, posing long-term risks to organizational stability and security.
Affected Version(s)
Jenkins OpenID Connect Provider Plugin 0 <= 96.vee8ed882ec4d