CVE-2025-64131

HIGH

Jenkins SAML Plugin <4.583 - Auth Bypass

Title source: llm
STIX 2.1

Description

Jenkins SAML Plugin 4.583.vc68232f7018a_ and earlier does not implement a replay cache, allowing attackers able to obtain information about the SAML authentication flow between a user's web browser and Jenkins to replay those requests, authenticating to Jenkins as that user.

Scores

CVSS v3 7.5
EPSS 0.0003
EPSS Percentile 7.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-294
Status published
Products (2)
jenkins/saml < 4.583.585.v22ccc1139f55
org.jenkins-ci.plugins/saml 0 - 4.583.585.v22ccc1139f55Maven
Published Oct 29, 2025
Tracked Since Feb 18, 2026