CVE-2022-34175
Java vulnerability analysis and mitigation

Overview

Jenkins uses the Stapler web framework to render its UI views in versions 2.335 through 2.355. A vulnerability identified as CVE-2022-34175 was discovered where the protection mechanism for view fragments was disabled for some views, potentially allowing attackers to directly access view fragments containing sensitive information while bypassing permission checks. This vulnerability affects Jenkins installations between versions 2.335 and 2.355 (both inclusive). The issue was discovered and reported by Wadeck Follonier and Daniel Beck from CloudBees, Inc (Jenkins Advisory).

Technical details

The vulnerability stems from a disabled protection mechanism that was originally implemented to fix SECURITY-534 in Jenkins 2.186 and LTS 2.176.2. The protection was meant to prevent direct access to view fragments that could contain sensitive information. In the affected versions, this protection was inadvertently disabled for certain views, creating a security gap. The vulnerability has been assigned a Medium severity CVSS rating (Jenkins Advisory).

Impact

The vulnerability could allow attackers to bypass permission checks and directly access view fragments containing sensitive information. However, as noted by the Jenkins security team at the time of publication, they were unaware of any vulnerable view fragments across the Jenkins plugin ecosystem that could be exploited (Jenkins Advisory).

Mitigation and workarounds

The vulnerability was fixed in Jenkins 2.356, which restored the protection for affected views. No Jenkins LTS release was affected by this issue, as it was not present in Jenkins 2.332.x and was fixed in the 2.346.x line before 2.346.1. Users running affected versions should upgrade to Jenkins 2.356 or later to address this vulnerability (Jenkins Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26866HIGH8.8
  • JavaJava
  • org.apache.hugegraph:hg-pd-core
NoYesDec 12, 2025
CVE-2025-66474HIGH8.7
  • JavaJava
  • org.xwiki.rendering:xwiki-rendering-xml
NoYesDec 10, 2025
CVE-2025-66473HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-rest-server
NoYesDec 10, 2025
CVE-2025-67505HIGH8.4
  • JavaJava
  • com.okta.sdk:okta-sdk-root
NoYesDec 10, 2025
CVE-2025-14518MEDIUM5.3
  • JavaJava
  • tech.powerjob:powerjob-common
NoNoDec 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management