Multiple Jenkins Flaws Include SAML Authentication Bypass and MCP Plugin Permission Issues

Multiple Jenkins Flaws Include SAML Authentication Bypass and MCP Plugin Permission Issues
Multiple Jenkins Flaws Include SAML Authentication Bypass and MCP Plugin Permission Issues
Jenkins automation server deployments face significant security risks following the disclosure of 14 distinct vulnerabilities spanning multiple plugins.

The security advisory reveals a widespread pattern of authentication bypass mechanisms, missing permission enforcement, and credential exposure issues that collectively threaten enterprise CI/CD infrastructure.

Organizations running affected versions must prioritize patching to prevent unauthorized access and privilege escalation attacks.

SAML Authentication Bypass Threatens User Sessions

The most critical vulnerability emerges from the SAML plugin, tracked as CVE-2025-64131 with a CVSS 3.1 score of 8.4.

The plugin failed to implement a replay cache in versions 4.583.vc68232f7018a and earlier, allowing attackers to intercept and replay SAML authentication requests between a user’s web browser and Jenkins.

This authentication bypass grants attackers complete access to user accounts without requiring valid credentials or authentication details.

The attack requires only that threat actors obtain information about the SAML authentication flow; once captured, replayed requests authenticate them as legitimate users.

Jenkins addressed this critical vulnerability by implementing proper replay cache protection in version 4.583.585.v22ccc1139f55, making immediate updates essential for affected deployments.

Organizations relying on SAML-based authentication should prioritize updating to patched versions to eliminate this attack surface.

CVE IDSeverityCVSS ScoreVulnerability TypeAffected VersionsPatched Version
CVE-2025-64131High8.4Replay Attack≤ 4.583.vc68232f7018a4.583.585.v22ccc1139f55
CVE-2025-64140High8.8Shell Command Injection0.24.v1d0e3e50629e and earlier0.25.vb_6e4cbb27d26c
CVE-2025-64134High7.1XXE InjectionAffected versionsPatched
CVE-2025-64132Medium6.5Missing Permission Checks≤ 0.84.v50ca_24ef83f20.86.v7d3355e6a_a_18
CVE-2025-64149Medium6.5CSRFMultiple pluginsVaries
CVE-2025-64150Medium6.5Missing Permission CheckMultiple pluginsVaries
CVE-2025-64135Medium5.9Disabled Security FeatureAffected versionsPatched
CVE-2025-64133Medium5.4CSRFExtensible Choice ParameterPatched
CVE-2025-64138Medium5.4CSRFThemis PluginPatched
CVE-2025-64139Medium5.4Missing Permission CheckMultiple pluginsVaries
CVE-2025-64141Medium5.4CSRFWindocks Container ManagerPatched
CVE-2025-64142Medium5.4Missing Permission CheckMultiple pluginsVaries
CVE-2025-64143Medium5.7Plaintext Token StorageMultiple pluginsPatched
CVE-2025-64144Medium5.7Plaintext Token StorageMultiple pluginsPatched
CVE-2025-64145Medium5.7Credential Masking IssueMultiple pluginsPatched
CVE-2025-64146Medium5.7Plaintext API Key StorageMultiple pluginsPatched
CVE-2025-64147Medium5.7API Key Masking IssueMultiple pluginsPatched
CVE-2025-64148Medium5.7Credential EnumerationMultiple pluginsPatched
CVE-2025-64136Medium4.3CSRFMultiple pluginsPatched
CVE-2025-64137Medium4.3Missing Permission CheckMultiple pluginsVaries

The MCP Server plugin carries multiple authorization failures in version 0.84.v50ca_24ef83f2 and earlier, rated as medium severity through CVE-2025-64132.

The plugin fails to perform adequate permission checks across several tools, creating pathways for privilege escalation.

Attackers with basic Item/Read permissions can obtain sensitive information about configured source control systems despite lacking Item/Extended Read privileges.

More alarmingly, the same low-level access allows attackers to trigger new builds of protected jobs without Item/Build permissions.

Additional authentication gaps permit unauthenticated users lacking Overall/Read permissions to retrieve names of configured clouds.

Version 0.86.v7d3355e6a_a_18 addresses these authorization oversights through comprehensive permission validation.

Azure CLI Plugin CVE-2025-64140 represents another high-severity vulnerability with a CVSS score of 8.8.

The plugin fails to restrict shell command execution on the Jenkins controller, allowing attackers with Item/Configure permissions to execute arbitrary system commands with Jenkins process privileges.

JDepend Plugin vulnerability CVE-2025-64134 introduces XML external entity injection through outdated dependencies, potentially exposing secrets or enabling server-side request forgery attacks.

Additional weaknesses include CSRF vulnerabilities across multiple plugins, plaintext storage of authentication tokens and API keys in configuration files, and credential enumeration through missing permission checks.

Several plugins store sensitive credentials unencrypted in config.xml files, viewable by users with Item/Extended Read permissions or direct file system access.

Organizations running affected Jenkins deployments should prioritize patching high-severity vulnerabilities first, particularly SAML plugin replay attacks and Azure CLI command injection flaws.

Enterprise teams must review their plugin inventory against the affected versions list and apply available security updates immediately to secure their CI/CD infrastructure.

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

The post Multiple Jenkins Flaws Include SAML Authentication Bypass and MCP Plugin Permission Issues appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading