
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-25768 is a security vulnerability discovered in Jenkins Azure Credentials Plugin versions 253.v887e0f9e898b and earlier. The vulnerability was disclosed on February 15, 2023, and is characterized by a missing permission check in methods implementing form validation. This security flaw affects the Jenkins Azure Credentials Plugin, a component used for managing Azure credentials within Jenkins environments (Jenkins Advisory).
The vulnerability stems from inadequate permission checks in methods implementing form validation within the Azure Credentials Plugin. The issue has been assigned a Medium severity (CVSS) rating. The vulnerability exists in version 253.v887e0f9e898b and earlier versions of the plugin, allowing attackers with Overall/Read permission to connect to an attacker-specified web server (Jenkins Advisory).
The vulnerability allows attackers with Overall/Read permission to connect to an attacker-specified web server, potentially leading to unauthorized access and data exposure. This security flaw could be exploited as part of a broader attack strategy to compromise Jenkins installations (NVD).
The vulnerability has been fixed in Azure Credentials Plugin version 254.v64da_8176c83a. The updated version implements proper permission checks requiring POST requests and Overall/Administer permission for the form validation methods. Users are strongly advised to upgrade to this version to mitigate the security risk (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."