CVE-2022-25173
HIGHJenkins Pipeline < 2648.va9433432b33c - OS Command Injection
Title source: ruleDescription
Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier uses the same checkout directories for distinct SCMs when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.
Exploits (1)
nomisec
WORKING POC
by shoucheng3 · poc
https://github.com/shoucheng3/jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646-v6ed3b5b01ff1
Scores
CVSS v3
8.8
EPSS
0.0018
EPSS Percentile
39.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (2)
jenkins/pipeline\
< 2648.va9433432b33c
org.jenkins-ci.plugins.workflow/workflow-cps
2646.v6ed3b5b01ff1 - 2656.vf7aMaven
Published
Feb 15, 2022
Tracked Since
Feb 18, 2026