VYPR
Moderate severityNVD Advisory· Published Feb 15, 2022· Updated Aug 3, 2024

CVE-2022-25177

CVE-2022-25177

Description

Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier follows symbolic links to locations outside of the expected Pipeline library when reading files using the libraryResource step, allowing attackers able to configure Pipelines to read arbitrary files on the Jenkins controller file system.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Jenkins Pipeline: Shared Groovy Libraries Plugin follows symlinks via libraryResource, allowing attackers to read arbitrary controller files.

Vulnerability

Jenkins Pipeline: Shared Groovy Libraries Plugin version 552.vd9cc05b8a2e1 and earlier follows symbolic links to locations outside of the expected Pipeline library when reading files using the libraryResource step [1][2]. This allows attackers able to configure Pipelines to read arbitrary files on the Jenkins controller file system [1][2].

Exploitation

An attacker must have the ability to configure Pipelines (e.g., Item/Configure permission) in order to exploit this vulnerability [1]. By crafting a Pipeline that uses the libraryResource step to read a file that is a symbolic link pointing outside the intended library directory, the attacker can cause the plugin to read arbitrary files on the controller's file system [1][2].

Impact

On successful exploitation, an attacker gains the ability to read arbitrary files from the Jenkins controller file system [1][2]. This could lead to disclosure of sensitive information such as credentials, configuration files, or source code stored on the controller.

Mitigation

Jenkins has released updated versions of the Pipeline: Shared Groovy Libraries Plugin that address this issue [1]. Users should upgrade to the latest version available from the Jenkins update center. No workarounds are provided in the available references [1][2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.plugins.workflow:workflow-cps-global-libMaven
>= 2.22, < 561.va_ce0de3c2d69561.va_ce0de3c2d69
org.jenkins-ci.plugins.workflow:workflow-cps-global-libMaven
>= 2.19, < 2.21.12.21.1
org.jenkins-ci.plugins.workflow:workflow-cps-global-libMaven
< 2.18.12.18.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

1