CVE-2025-47887: Jenkins Cadence vManager Plugin is Missing Permission Checks
4.3
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:vmanager-plugin | maven | < 4.0.1-288.v8804beaacb7f | 4.0.1-288.v8804b_ea_a_cb_7f |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability lies in several doTestConnection, doTestArchiveUser, and doTestExtraStaticAttr methods across different classes within the Jenkins Cadence vManager Plugin. These methods are typically used in Jenkins to validate form inputs in configuration pages. Before the patch, these methods would attempt to connect to a user-specified URL with user-specified credentials without checking if the current user had the necessary Item.CONFIGURE permissions. The patch (commit b08b571ebc4d5d6b4bc80e65e4ddf45760a32cca) consistently adds item.checkPermission(Item.CONFIGURE); to these methods. The absence of this check is the core of the vulnerability, as it allows users with only Overall/Read permission to trigger these connections. The identified functions are the exact methods where this permission check was missing and subsequently added. The names include the class and the inner DescriptorImpl class where these methods are typically defined for Jenkins UI interactions.