An elevation of privilege vulnerability exists when Visual Studio improperly handles pipeline job tokens. An attacker who successfully exploited this vulnerability could extend their access to a project.
To exploit this vulnerability, an attacker would first have to have access to the project and swap the short-term token for a long-term one.
The update addresses the vulnerability by correcting how the Visual Studio updater handles these tokens.
Metrics
Affected Vendors & Products
References
History
Fri, 09 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 08 May 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An elevation of privilege vulnerability exists when Visual Studio improperly handles pipeline job tokens. An attacker who successfully exploited this vulnerability could extend their access to a project. To exploit this vulnerability, an attacker would first have to have access to the project and swap the short-term token for a long-term one. The update addresses the vulnerability by correcting how the Visual Studio updater handles these tokens. | |
Title | Azure DevOps Elevation of Privilege Vulnerability | |
Weaknesses | CWE-302 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: microsoft
Published: 2025-05-08T22:17:26.036Z
Updated: 2025-05-10T03:55:16.544Z
Reserved: 2025-03-11T18:19:40.248Z
Link: CVE-2025-29813

Updated: 2025-05-09T13:41:05.680Z

Status : Received
Published: 2025-05-08T23:15:52.153
Modified: 2025-05-08T23:15:52.153
Link: CVE-2025-29813

No data.