In Jenkins WSO2 Oauth Plugin 1.0 and earlier, authentication claims are accepted without validation by the "WSO2 Oauth" security realm, allowing unauthenticated attackers to log in to controllers using this security realm using any username and any password, including usernames that do not exist.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Jun 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jenkins
Jenkins wso2 Oauth |
|
CPEs | cpe:2.3:a:jenkins:wso2_oauth:*:*:*:*:*:jenkins:*:* | |
Vendors & Products |
Jenkins
Jenkins wso2 Oauth |
Mon, 19 May 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-287 |
Thu, 15 May 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Wed, 14 May 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Jenkins WSO2 Oauth Plugin 1.0 and earlier, authentication claims are accepted without validation by the "WSO2 Oauth" security realm, allowing unauthenticated attackers to log in to controllers using this security realm using any username and any password, including usernames that do not exist. | |
References |
|

Status: PUBLISHED
Assigner: jenkins
Published: 2025-05-14T20:35:58.095Z
Updated: 2025-05-19T15:25:14.896Z
Reserved: 2025-05-13T12:21:13.541Z
Link: CVE-2025-47889

Updated: 2025-05-15T20:12:57.143Z

Status : Analyzed
Published: 2025-05-14T21:15:59.843
Modified: 2025-06-12T13:23:31.790
Link: CVE-2025-47889

No data.