CVE-2025-53652

Jenkins Git Parameter Plugin 439.vb_0e46ca_14534 and earlier does not validate that the Git parameter value submitted to the build matches one of the offered choices, allowing attackers with Item/Build permission to inject arbitrary values into Git parameters.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:git_parameter:*:*:*:*:*:jenkins:*:*

History

18 Jul 2025, 18:03

Type Values Removed Values Added
CPE cpe:2.3:a:jenkins:git_parameter:*:*:*:*:*:jenkins:*:*
First Time Jenkins
Jenkins git Parameter
References () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3419 - () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3419 - Vendor Advisory

10 Jul 2025, 13:17

Type Values Removed Values Added
Summary
  • (es) Jenkins Git Parameter Plugin 439.vb_0e46ca_14534 y anteriores no valida que el valor del parámetro Git enviado a la compilación coincida con una de las opciones ofrecidas, lo que permite a los atacantes con permiso de Elemento/Compilación inyectar valores arbitrarios en los parámetros Git.

09 Jul 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.2
CWE CWE-20

09 Jul 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-09 16:15

Updated : 2025-07-18 18:03


NVD link : CVE-2025-53652

Mitre link : CVE-2025-53652

CVE.ORG link : CVE-2025-53652


JSON object : View

Products Affected

jenkins

  • git_parameter
CWE
CWE-20

Improper Input Validation