CVE-2022-25201:
Missing permission checks in Jenkins Checkmarx Plugin allow capturing credentials
4.2
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
2/16/2022
Updated
2/3/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.checkmarx.jenkins:checkmarx | maven | < 2022.1.3 | 2022.1.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on missing permission checks in HTTP endpoints. Jenkins plugins typically implement form validation and connection testing through do* methods in Descriptor classes. The security advisory specifically mentions endpoints that should require POST requests and admin permissions, which aligns with common patterns like doTestConnection and doVerifyCredentials. The patch release notes mention fixing CSRF and permission issues, confirming these authentication-related endpoints were vulnerable. The CxDescriptor class is the logical location for these methods based on standard Jenkins plugin architecture.