CVE-2025-31723 – io.jenkins.plugins:simple-queue
Package
Manager: maven
Name: io.jenkins.plugins:simple-queue
Vulnerable Version: >=0 <1.4.7
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00019 pctl0.03396
Details
Jenkins Simple Queue Plugin Cross-Site Request Forgery (CSRF) Jenkins Simple Queue Plugin 1.4.6 and earlier does not require POST requests for multiple HTTP endpoints, resulting in cross-site request forgery (CSRF) vulnerabilities. These vulnerabilities allow attackers to change and reset the build queue order. Simple Queue Plugin 1.4.7 requires POST requests for the affected HTTP endpoints. Administrators can enable equivalent HTTP endpoints without CSRF protection via the global configuration.
Metadata
Created: 2025-04-02T15:31:38Z
Modified: 2025-04-02T22:43:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-hcfh-qjcp-34q9/GHSA-hcfh-qjcp-34q9.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-hcfh-qjcp-34q9
Finding: F007
Auto approve: 1