CVE-2025-47889
Java vulnerability analysis and mitigation

Overview

CVE-2025-47889 is a critical authentication bypass vulnerability discovered in Jenkins WSO2 Oauth Plugin version 1.0 and earlier. The vulnerability was disclosed on May 14, 2025, affecting the WSO2 Oauth security realm component of the Jenkins automation server. The flaw allows unauthenticated attackers to bypass authentication controls by accepting authentication claims without proper validation (Jenkins Advisory, NVD).

Technical details

The vulnerability stems from the WSO2 Oauth Plugin's failure to validate authentication claims in the WSO2 Oauth security realm. This critical flaw has received a CVSS v3.1 score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. Sessions created through this vulnerability lack additional authorities and group memberships, including the 'authenticated' group membership (Jenkins Advisory, Security Online).

Impact

The impact varies depending on the authorization strategy configured in Jenkins. With the 'Logged-in users can do anything' strategy, attackers gain Overall/Administer permissions. Under the 'Role-based strategy', attackers receive permissions assigned directly to the specified user. For 'Matrix-based security' and 'Project-based Matrix Authorization Strategy', attackers obtain permissions assigned directly to the user but not group-based permissions (Jenkins Advisory).

Mitigation and workarounds

As of the advisory publication on May 14, 2025, no official fix is available for the WSO2 Oauth Plugin. Organizations using this plugin should consider disabling or uninstalling it until a security patch is released (Jenkins Advisory).

Community reactions

The vulnerability has garnered significant attention in the security community, particularly due to its critical severity rating and the widespread use of Jenkins in enterprise environments. Security researchers have emphasized the serious nature of authentication bypass vulnerabilities in CI/CD infrastructure (Security Online).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management