CVE-2025-27625 (Medium) detected in jenkins-core-2.426.3.jar #5381
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
untriaged
Issues that have not yet been triaged
CVE-2025-27625 - Medium Severity Vulnerability
Jenkins core code and view files to render HTML.
Library home page: https://github.com/jenkinsci/jenkins
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.main/jenkins-core/2.426.3/eee94c4c0c78e715d2a599eb66a5a89c5eed9d18/jenkins-core-2.426.3.jar
Dependency Hierarchy:
Found in base branch: main
In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash ("") characters are considered safe, allowing attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site, because browsers interpret these characters as part of scheme-relative redirects.
Publish Date: 2025-03-05
URL: CVE-2025-27625
Base Score Metrics:
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3501
Release Date: 2025-03-05
Fix Resolution: 2.492.2
The text was updated successfully, but these errors were encountered: