VYPR
Moderate severityNVD Advisory· Published Nov 15, 2022· Updated Apr 30, 2025

CVE-2022-45389

CVE-2022-45389

Description

A missing permission check in Jenkins XP-Dev Plugin 1.0 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to an attacker-specified repository.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Jenkins XP-Dev Plugin 1.0 and earlier lacks a permission check, allowing unauthenticated attackers to trigger builds for an attacker-specified repository.

Vulnerability

Overview

The Jenkins XP-Dev Plugin versions 1.0 and earlier contain a missing permission check in its build trigger functionality. The plugin fails to verify that the user has the required permissions (e.g., Build permission) before initiating a build for a given repository. This flaw allows an attacker to bypass access controls entirely [1].

Exploitation

An unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a Jenkins instance that has the XP-Dev Plugin installed. The request specifies a repository of the attacker's choosing, and the plugin will trigger builds of jobs configured to use that repository without any authentication or authorization checks [2]. No prior access or credentials are required.

Impact

Successful exploitation enables an attacker to trigger arbitrary builds on the Jenkins server. This can lead to resource exhaustion, denial of service, or unintended execution of build steps that may expose sensitive information or cause other harmful side effects. The attacker can also potentially interfere with legitimate build processes [1][2].

Mitigation

As of the advisory date (2022-11-15), no fixed version of the XP-Dev Plugin has been released. The plugin is listed among those with unresolved security issues [2]. Users are advised to disable the plugin if it is not essential, or restrict network access to the Jenkins instance to prevent unauthenticated requests. Administrators should monitor for any future updates from the plugin maintainer.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
com.cloudbees.jenkins.plugins:xpdevMaven
<= 1.0

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1