VYPR
Moderate severityNVD Advisory· Published May 14, 2025· Updated May 15, 2025

CVE-2025-47887

CVE-2025-47887

Description

Missing permission checks in Jenkins Cadence vManager Plugin 4.0.1-286.v9e25a_740b_a_48 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing permission checks in Jenkins Cadence vManager Plugin allow attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

Vulnerability

Description

The Jenkins Cadence vManager Plugin, versions 4.0.1-286.v9e25a_740b_a_48 and earlier, contains missing permission checks when performing certain operations. Specifically, the plugin does not properly verify that a user has the necessary permissions to initiate connections to external URLs. This allows an attacker who only has the Overall/Read permission to trigger the plugin to connect to an attacker-specified URL using attacker-supplied username and password credentials. [1][2][3]

Exploitation

Prerequisites

To exploit this vulnerability, an attacker must have Overall/Read permission on the Jenkins instance. This is a relatively low-privilege permission that is often granted to users for read-only access. The attacker can specify any URL and provide arbitrary credentials, which the plugin will then use to attempt an authenticated connection. The attack does not require any special network position or additional privileges beyond this read-level access. [3][4]

Impact

A successful exploit allows the attacker to leverage the Jenkins server's network connectivity to connect to external services, potentially enabling server-side request forgery (SSRF) or credential probing attacks. The attacker can direct the plugin to authenticate to arbitrary endpoints with credentials of their choosing, which could be used to probe for valid credentials against internal or external services, or to interact with attacker-controlled servers. This could lead to further compromise depending on the services accessible from the Jenkins server. [3][4]

Mitigation

The vulnerability has been fixed in a subsequent release. Users are advised to upgrade the Cadence vManager Plugin to a version newer than 4.0.1-286.v9e25a_740b_a_48. The fix was implemented in pull request #25 of the plugin's GitHub repository, which addressed the missing permission checks (referred to as SECURITY-3548 in Jenkins' internal tracking). [2][4]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.plugins:vmanager-pluginMaven
< 4.0.1-288.v8804b_ea_a_cb_7f4.0.1-288.v8804b_ea_a_cb_7f

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

1