CVE-2022-25173

HIGH

Jenkins Pipeline < 2648.va9433432b33c - OS Command Injection

Title source: rule

Description

Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier uses the same checkout directories for distinct SCMs when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.

Exploits (1)

nomisec WORKING POC
by shoucheng3 · poc
https://github.com/shoucheng3/jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646-v6ed3b5b01ff1

Scores

CVSS v3 8.8
EPSS 0.0018
EPSS Percentile 39.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (2)
jenkins/pipeline\ < 2648.va9433432b33c
org.jenkins-ci.plugins.workflow/workflow-cps 2646.v6ed3b5b01ff1 - 2656.vf7aMaven
Published Feb 15, 2022
Tracked Since Feb 18, 2026