
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2025-47888 affects the Jenkins DingTalk Plugin versions 2.7.3 and earlier. This security flaw, discovered by Pierre Beitz from CloudBees, Inc., was publicly disclosed on May 14, 2025. The vulnerability involves the plugin's unconditional disabling of SSL/TLS certificate and hostname validation for connections to configured DingTalk webhooks (Jenkins Advisory, Wiz).
The vulnerability stems from the DingTalk Plugin's implementation that unconditionally disables SSL/TLS certificate and hostname validation when establishing connections to configured DingTalk webhooks. The issue has been assigned a Medium severity rating with a CVSS v3.1 base score of 5.9 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N). The vulnerability is tracked under the identifier SECURITY-3353 in Jenkins' security tracking system (Jenkins Advisory, AttackerKB).
The disabling of SSL/TLS certificate and hostname validation makes the plugin's connections vulnerable to Man-in-the-Middle (MITM) attacks. This security weakness could allow attackers to intercept, monitor, or manipulate the communication between Jenkins and DingTalk webhooks (Wiz).
As of the publication of the security advisory on May 14, 2025, no fix is available for this vulnerability. Users of the affected plugin should consider implementing network-level security controls to protect webhook communications until a patch is released (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."