{"api_version":"1","generated_at":"2026-04-23T04:34:28+00:00","cve":"CVE-2022-25196","urls":{"html":"https://cve.report/CVE-2022-25196","api":"https://cve.report/api/cve/CVE-2022-25196.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-25196","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-25196"},"summary":{"title":"CVE-2022-25196","description":"Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP Referer header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in.","state":"PUBLIC","assigner":"jenkinsci-cert@googlegroups.com","published_at":"2022-02-15 17:15:00","updated_at":"2023-11-03 16:24:00"},"problem_types":["CWE-601"],"metrics":[],"references":[{"url":"https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1833","name":"https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1833","refsource":"CONFIRM","tags":["Issue Tracking","Patch","Vendor Advisory"],"title":"Jenkins Security Advisory 2022-02-15","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2022/02/15/2","name":"[oss-security] 20220215 Multiple vulnerabilities in Jenkins plugins","refsource":"MLIST","tags":["Mailing List","Third Party Advisory"],"title":"oss-security - Multiple vulnerabilities in Jenkins plugins","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-25196","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25196","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"25196","vulnerable":"1","versionEndIncluding":"1.13","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jenkins","cpe5":"gitlab_authentication","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"jenkins","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-25196","qid":"376435","title":"Jenkins Plugins Multiple Security Vulnerabilities (Jenkins Security Advisory 2022-02-15)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-25196","ASSIGNER":"jenkinsci-cert@googlegroups.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP Referer header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Jenkins project","product":{"product_data":[{"product_name":"Jenkins GitLab Authentication Plugin","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"lessThanOrEqual":"1.13","status":"affected","version":"unspecified","versionType":"custom"},{"lessThan":"unspecified","status":"unknown","version":"next of 1.13","versionType":"custom"}]}}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1833","refsource":"MISC","name":"https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1833"},{"url":"http://www.openwall.com/lists/oss-security/2022/02/15/2","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2022/02/15/2"}]}},"nvd":{"publishedDate":"2022-02-15 17:15:00","lastModifiedDate":"2023-11-03 16:24:00","problem_types":["CWE-601"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.9},"severity":"MEDIUM","exploitabilityScore":6.8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jenkins:gitlab_authentication:*:*:*:*:*:jenkins:*:*","versionEndIncluding":"1.13","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}