
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-25174 is a high-severity vulnerability affecting the Jenkins Pipeline: Shared Groovy Libraries Plugin version 552.vd9cc05b8a2e1 and earlier. The vulnerability was disclosed on February 15, 2022, as part of a broader Jenkins security advisory. The issue affects the plugin's handling of SCM checkouts for Pipeline libraries (Jenkins Advisory).
The vulnerability stems from the plugin's implementation where it uses the same checkout directories for distinct SCMs for Pipeline libraries. This design flaw creates a security weakness that could be exploited by attackers who have Item/Configure permission on the Jenkins instance. The severity is rated as High according to the CVSS scoring system (Jenkins Advisory).
When exploited, this vulnerability allows attackers with Item/Configure permission to invoke arbitrary OS commands on the Jenkins controller through crafted SCM contents. This represents a significant security risk as it could lead to complete system compromise (Jenkins Advisory).
The vulnerability has been fixed in Pipeline: Shared Groovy Libraries Plugin version 561.va_ce0de3c2d69. The updated version uses distinct checkout directories per SCM for Pipeline libraries, preventing the security issue. Users are advised to upgrade to this version or later to mitigate the vulnerability (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."