CVE-2025-24398: Bitbucket Server Integration Plugin allows bypassing CSRF protection for any URL
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.3965%
CWE
Published
1/22/2025
Updated
1/22/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
io.jenkins.plugins:atlassian-bitbucket-server-integration | maven | >= 2.1.0, < 4.1.4 | 4.1.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the plugin's implementation of Jenkins' CrumbExclusion extension point for OAuth 1.0 authentication. The advisory indicates the exclusion logic was too broad in vulnerable versions (2.1.0-4.1.3). The standard Jenkins CSRF protection mechanism uses CrumbExclusion implementations to whitelist specific URLs. The vulnerable function likely used insufficiently restrictive pattern matching in its exclude()
method, potentially matching any URL containing a crafted pattern rather than strictly limiting to required OAuth endpoints. The patch in 4.1.4 would have tightened the URL validation logic in this exclusion handler.