HomeJenkinsCVE-2025-64131

CVE-2025-64131

HIGH
7.5CVSS
Published: 2025-10-29
Updated: 2025-12-22
AI Analysis

Description

Jenkins SAML Plugin 4.583.vc68232f7018a_ and earlier does not implement a replay cache, allowing attackers able to obtain information about the SAML authentication flow between a user's web browser and Jenkins to replay those requests, authenticating to Jenkins as that user.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
high
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-294

Metadata

Primary Vendor
JENKINS
Published
10/29/2025
Last Modified
12/22/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

jenkins : saml

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-64131 | HIGH Severity | CVEDatabase.com | CVEDatabase.com