An elevation of privilege vulnerability exists when Visual Studio improperly handles pipeline job tokens. An attacker who successfully exploited this vulnerability could extend their access to a project. To exploit this vulnerability, an attacker would first have to have access to the project and swap the short-term token for a long-term one. The update addresses the vulnerability by correcting how the Visual Studio updater handles these tokens.
History

Fri, 09 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 08 May 2025 22:30:00 +0000

Type Values Removed Values Added
Description An elevation of privilege vulnerability exists when Visual Studio improperly handles pipeline job tokens. An attacker who successfully exploited this vulnerability could extend their access to a project. To exploit this vulnerability, an attacker would first have to have access to the project and swap the short-term token for a long-term one. The update addresses the vulnerability by correcting how the Visual Studio updater handles these tokens.
Title Azure DevOps Elevation of Privilege Vulnerability
Weaknesses CWE-302
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published: 2025-05-08T22:17:26.036Z

Updated: 2025-05-10T03:55:16.544Z

Reserved: 2025-03-11T18:19:40.248Z

Link: CVE-2025-29813

cve-icon Vulnrichment

Updated: 2025-05-09T13:41:05.680Z

cve-icon NVD

Status : Received

Published: 2025-05-08T23:15:52.153

Modified: 2025-05-08T23:15:52.153

Link: CVE-2025-29813

cve-icon Redhat

No data.