
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-25183 is a high severity vulnerability affecting the Jenkins Pipeline: Deprecated Groovy Libraries Plugin versions 552.vd9cc05b8a2e1 and earlier. The vulnerability was discovered by Devin Nusbaum of CloudBees, Inc. and disclosed on February 15, 2022 (Jenkins Advisory).
The vulnerability exists because the plugin uses the names of Pipeline libraries to create cache directories without any sanitization. The vulnerability has a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
This vulnerability allows attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM using specially crafted library names if a global Pipeline library configured to use caching already exists (Jenkins Advisory).
The vulnerability was fixed in Pipeline: Deprecated Groovy Libraries Plugin version 561.va_ce0de3c2d69, which sanitizes the names of Pipeline libraries when creating library cache directories. Users are advised to upgrade to this version or later (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."