CVE-2025-47889 – Jenkins WSO2 Oauth Plugin Authentication Bypass Vulnerability

The following table lists the changes that have been made to the
CVE-2025-47889 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    May. 14, 2025

    Action Type Old Value New Value
    Added Description In Jenkins WSO2 Oauth Plugin 1.0 and earlier, authentication claims are accepted without validation by the “WSO2 Oauth” security realm, allowing unauthenticated attackers to log in to controllers using this security realm using any username and any password, including usernames that do not exist.
    Added Reference https://www.jenkins.io/security/advisory/2025-05-14/#SECURITY-3481
Share the Post:

Related Posts