VYPR
Moderate severityNVD Advisory· Published Oct 29, 2025· Updated Nov 4, 2025

CVE-2025-64133

CVE-2025-64133

Description

A cross-site request forgery (CSRF) vulnerability in Jenkins Extensible Choice Parameter Plugin 239.v5f5c278708cf and earlier allows attackers to execute sandboxed Groovy code.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CSRF vulnerability in Jenkins Extensible Choice Parameter Plugin allows attackers to execute sandboxed Groovy code.

Vulnerability

A cross-site request forgery (CSRF) vulnerability exists in the Jenkins Extensible Choice Parameter Plugin versions 239.v5f5c278708cf and earlier. The plugin fails to require POST requests for an HTTP endpoint, allowing attackers to craft malicious requests that can be triggered by unsuspecting users with the necessary permissions [1].

Exploitation

To exploit this vulnerability, an attacker must trick a Jenkins user with sufficient permissions (e.g., Job/Configure) into clicking a crafted link or visiting a malicious page. The CSRF attack can then execute sandboxed Groovy code on the Jenkins controller [1]. The sandbox restricts the Groovy code's capabilities, but it still presents a significant risk.

Impact

Successful exploitation enables the attacker to execute arbitrary sandboxed Groovy scripts. While the sandbox limits access to certain sensitive operations, attackers can still perform actions within sandbox constraints, such as reading job configurations or triggering builds, potentially leading to further compromise [1][4].

Mitigation

As of the advisory date, no fix has been released for this plugin. The plugin is listed as unresolved in the Jenkins security advisory, meaning users are advised to restrict plugin usage or apply workarounds such as disabling the plugin or using HTTP POST enforcement via reverse proxy settings [2]. The Jenkins security team recommends monitoring for updates.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
jp.ikedam.jenkins.plugins:extensible-choice-parameterMaven
<= 239.v5f5c278708cf

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1