CVE-2025-64133
Description
A cross-site request forgery (CSRF) vulnerability in Jenkins Extensible Choice Parameter Plugin 239.v5f5c278708cf and earlier allows attackers to execute sandboxed Groovy code.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CSRF vulnerability in Jenkins Extensible Choice Parameter Plugin allows attackers to execute sandboxed Groovy code.
Vulnerability
A cross-site request forgery (CSRF) vulnerability exists in the Jenkins Extensible Choice Parameter Plugin versions 239.v5f5c278708cf and earlier. The plugin fails to require POST requests for an HTTP endpoint, allowing attackers to craft malicious requests that can be triggered by unsuspecting users with the necessary permissions [1].
Exploitation
To exploit this vulnerability, an attacker must trick a Jenkins user with sufficient permissions (e.g., Job/Configure) into clicking a crafted link or visiting a malicious page. The CSRF attack can then execute sandboxed Groovy code on the Jenkins controller [1]. The sandbox restricts the Groovy code's capabilities, but it still presents a significant risk.
Impact
Successful exploitation enables the attacker to execute arbitrary sandboxed Groovy scripts. While the sandbox limits access to certain sensitive operations, attackers can still perform actions within sandbox constraints, such as reading job configurations or triggering builds, potentially leading to further compromise [1][4].
Mitigation
As of the advisory date, no fix has been released for this plugin. The plugin is listed as unresolved in the Jenkins security advisory, meaning users are advised to restrict plugin usage or apply workarounds such as disabling the plugin or using HTTP POST enforcement via reverse proxy settings [2]. The Jenkins security team recommends monitoring for updates.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
jp.ikedam.jenkins.plugins:extensible-choice-parameterMaven | <= 239.v5f5c278708cf | — |
Affected products
2- Range: <=239.v5f5c278708cf
- Jenkins Project/Jenkins Extensible Choice Parameter Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-3jw2-5hjg-hc2cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-64133ghsaADVISORY
- www.jenkins.io/security/advisory/2025-10-29/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2025/10/29/2ghsaWEB
News mentions
1- Jenkins Security Advisory 2025-10-29Jenkins Security Advisories · Oct 29, 2025