In Jenkins WSO2 Oauth Plugin 1.0 and earlier, authentication claims are accepted without validation by the "WSO2 Oauth" security realm, allowing unauthenticated attackers to log in to controllers using this security realm using any username and any password, including usernames that do not exist.
History

Thu, 12 Jun 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins
Jenkins wso2 Oauth
CPEs cpe:2.3:a:jenkins:wso2_oauth:*:*:*:*:*:jenkins:*:*
Vendors & Products Jenkins
Jenkins wso2 Oauth

Mon, 19 May 2025 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-287

Thu, 15 May 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 May 2025 20:45:00 +0000

Type Values Removed Values Added
Description In Jenkins WSO2 Oauth Plugin 1.0 and earlier, authentication claims are accepted without validation by the "WSO2 Oauth" security realm, allowing unauthenticated attackers to log in to controllers using this security realm using any username and any password, including usernames that do not exist.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published: 2025-05-14T20:35:58.095Z

Updated: 2025-05-19T15:25:14.896Z

Reserved: 2025-05-13T12:21:13.541Z

Link: CVE-2025-47889

cve-icon Vulnrichment

Updated: 2025-05-15T20:12:57.143Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-14T21:15:59.843

Modified: 2025-06-12T13:23:31.790

Link: CVE-2025-47889

cve-icon Redhat

No data.