logo

CVE-2025-31723 io.jenkins.plugins:simple-queue

Package

Manager: maven
Name: io.jenkins.plugins:simple-queue
Vulnerable Version: >=0 <1.4.7

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00019 pctl0.03396

Details

Jenkins Simple Queue Plugin Cross-Site Request Forgery (CSRF) Jenkins Simple Queue Plugin 1.4.6 and earlier does not require POST requests for multiple HTTP endpoints, resulting in cross-site request forgery (CSRF) vulnerabilities. These vulnerabilities allow attackers to change and reset the build queue order. Simple Queue Plugin 1.4.7 requires POST requests for the affected HTTP endpoints. Administrators can enable equivalent HTTP endpoints without CSRF protection via the global configuration.

Metadata

Created: 2025-04-02T15:31:38Z
Modified: 2025-04-02T22:43:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-hcfh-qjcp-34q9/GHSA-hcfh-qjcp-34q9.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-hcfh-qjcp-34q9
Finding: F007
Auto approve: 1