CVE-2025-53652
BaseFortify
Publication date: 2025-07-09
Last updated on: 2025-11-04
Assigner: Jenkins Project
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jenkins | git_parameter | to 444.vca_b_84d3703c2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Jenkins Git Parameter Plugin version 439.vb_0e46ca_14534 and earlier. It occurs because the plugin does not validate that the Git parameter value submitted to the build matches one of the predefined choices. As a result, attackers who have Item/Build permission can inject arbitrary values into Git parameters.
How can this vulnerability impact me? :
An attacker with Item/Build permission could exploit this vulnerability to inject arbitrary Git parameter values into a build. This could potentially lead to unauthorized code execution, manipulation of build processes, or other unintended behaviors within the Jenkins environment.