
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site request forgery (CSRF) vulnerability was discovered in Jenkins Azure Credentials Plugin versions 253.v887e0f9e898b and earlier. The vulnerability was identified as CVE-2023-25767 and was disclosed on February 15, 2023. The affected component is the Jenkins Azure Credentials Plugin, which is used for managing Azure credentials in Jenkins environments (Jenkins Advisory, NVD).
The vulnerability stems from form validation methods that do not require POST requests and lack proper permission checks in the Azure Credentials Plugin. This implementation flaw allows attackers to initiate unauthorized connections to attacker-specified web servers. The vulnerability is rated as Medium severity according to CVSS scoring system (Jenkins Advisory).
When exploited, this vulnerability allows attackers with Overall/Read permission to connect to an attacker-specified web server through cross-site request forgery attacks (Jenkins Advisory).
The vulnerability has been fixed in Azure Credentials Plugin version 254.v64da_8176c83a. The updated version implements proper security controls by requiring POST requests and Overall/Administer permission for the affected form validation methods (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."