
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-47889 is a critical authentication bypass vulnerability discovered in Jenkins WSO2 Oauth Plugin version 1.0 and earlier. The vulnerability was disclosed on May 14, 2025, affecting the WSO2 Oauth security realm component of the Jenkins automation server. The flaw allows unauthenticated attackers to bypass authentication controls by accepting authentication claims without proper validation (Jenkins Advisory, NVD).
The vulnerability stems from the WSO2 Oauth Plugin's failure to validate authentication claims in the WSO2 Oauth security realm. This critical flaw has received a CVSS v3.1 score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. Sessions created through this vulnerability lack additional authorities and group memberships, including the 'authenticated' group membership (Jenkins Advisory, Security Online).
The impact varies depending on the authorization strategy configured in Jenkins. With the 'Logged-in users can do anything' strategy, attackers gain Overall/Administer permissions. Under the 'Role-based strategy', attackers receive permissions assigned directly to the specified user. For 'Matrix-based security' and 'Project-based Matrix Authorization Strategy', attackers obtain permissions assigned directly to the user but not group-based permissions (Jenkins Advisory).
As of the advisory publication on May 14, 2025, no official fix is available for the WSO2 Oauth Plugin. Organizations using this plugin should consider disabling or uninstalling it until a security patch is released (Jenkins Advisory).
The vulnerability has garnered significant attention in the security community, particularly due to its critical severity rating and the widespread use of Jenkins in enterprise environments. Security researchers have emphasized the serious nature of authentication bypass vulnerabilities in CI/CD infrastructure (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”