Jenkins OpenID Connect Plugin <4.452 Case-Insens Auth Bypass to Admin
CVE-2025-24399 Published on January 22, 2025
Jenkins OpenId Connect Authentication Plugin 4.452.v2849b_d3945fa_ and earlier, except 4.438.440.v3f5f201de5dc, treats usernames as case-insensitive, allowing attackers on Jenkins instances configured with a case-sensitive OpenID Connect provider to log in as any user by providing a username that differs only in letter case, potentially gaining administrator access to Jenkins.
Vulnerability Analysis
CVE-2025-24399 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files.
Products Associated with CVE-2025-24399
Want to know whenever a new CVE is published for Jenkins Openid Connect Authentication? stack.watch will email you.
Affected Versions
Jenkins Project Jenkins OpenId Connect Authentication Plugin:- Version 4.453.v4d7765c854f4 and below * is unaffected.
- Version 4.438.440.v3f5f201de5dc is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.