Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jenkins-ci.plugins/wso2id-oauth
  4. ›
  5. CVE-2025-47889

CVE-2025-47889: Jenkins WSO2 Oauth Plugin Fails to Properly Authenticate User Credentials

May 14, 2025 (updated May 16, 2025)

In Jenkins WSO2 Oauth Plugin 1.0 and earlier, authentication claims are accepted without validation by the “WSO2 Oauth” security realm, allowing unauthenticated attackers to log in to controllers using this security realm using any username and any password, including usernames that do not exist.

References

  • github.com/advisories/GHSA-p89h-p4ph-4vj6
  • nvd.nist.gov/vuln/detail/CVE-2025-47889
  • www.jenkins.io/security/advisory/2025-05-14/

Code Behaviors & Features

Detect and mitigate CVE-2025-47889 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.0

Solution

Unfortunately, there is no solution available yet.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-1390: Weak Authentication

Source file

maven/org.jenkins-ci.plugins/wso2id-oauth/CVE-2025-47889.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:19:09 +0000.