A cross-site request forgery (CSRF) vulnerability in Jenkins Extensible Choice Parameter Plugin 239.v5f5c278708cf and earlier allows attackers to execute sandboxed Groovy code.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3jw2-5hjg-hc2c Jenkins Extensible Choice Parameter Plugin vulnerable to cross-site request forgery
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 22 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins extensible Choice Parameter
CPEs cpe:2.3:a:jenkins:extensible_choice_parameter:*:*:*:*:*:jenkins:*:*
Vendors & Products Jenkins extensible Choice Parameter

Tue, 04 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Thu, 30 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins
Jenkins jenkins
Vendors & Products Jenkins
Jenkins jenkins

Wed, 29 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-352
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Oct 2025 13:45:00 +0000

Type Values Removed Values Added
Description A cross-site request forgery (CSRF) vulnerability in Jenkins Extensible Choice Parameter Plugin 239.v5f5c278708cf and earlier allows attackers to execute sandboxed Groovy code.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-11-04T21:14:25.010Z

Reserved: 2025-10-28T07:34:37.541Z

Link: CVE-2025-64133

cve-icon Vulnrichment

Updated: 2025-11-04T21:14:25.010Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-29T14:15:57.463

Modified: 2025-12-22T15:24:38.880

Link: CVE-2025-64133

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-30T14:38:28Z

Weaknesses