CVE-2025-27624
Java vulnerability analysis and mitigation

Overview

A cross-site request forgery (CSRF) vulnerability was discovered in Jenkins versions 2.499 and earlier, as well as LTS 2.492.1 and earlier. The vulnerability was identified on March 5, 2025, and assigned CVE-2025-27624. This security issue affects the HTTP endpoint responsible for toggling collapsed/expanded status of sidepanel widgets in Jenkins (Jenkins Advisory, NVD).

Technical details

The vulnerability stems from the application's failure to require POST requests for the HTTP endpoint that controls the collapsed/expanded status of sidepanel widgets, such as Build Queue and Build Executor Status widgets. The vulnerability has been assigned a CVSS v3.1 base score of 5.4 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L. Additionally, the API accepts any string as the identifier of the panel ID to be toggled, which can lead to attacker-controlled content being stored in the victim's user profile (Jenkins Advisory, Rapid7).

Impact

The vulnerability allows attackers to manipulate users into toggling their collapsed/expanded status of sidepanel widgets. Furthermore, due to the API's acceptance of arbitrary strings as panel IDs, attackers can store malicious content in the victim's user profile within Jenkins (Jenkins Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Jenkins weekly version 2.500 and LTS version 2.492.2. The fix implements mandatory POST request requirements for the affected HTTP endpoint. Users are strongly advised to upgrade to these versions or later to protect against this vulnerability (Jenkins Advisory).

Community reactions

The vulnerability was discovered and reported by Antoine Ruffino from CloudBees, Inc., demonstrating ongoing security research within the Jenkins ecosystem. The Jenkins project promptly addressed the vulnerability through their security advisory process (Jenkins Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management