Cyber Posture

CVE-2025-24399

High

Published: 22 January 2025

Published
22 January 2025
Modified
07 May 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0040 60.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24399 is a high-severity Incorrect Default Permissions (CWE-276) vulnerability in Jenkins Openid Connect Authentication. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 39.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and IA-13 (Identity Providers and Authorization Servers).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of the flaw in the Jenkins OpenId Connect Authentication Plugin, preventing authentication bypass via case-insensitive username handling.

prevent

Establishes and implements requirements for OpenID Connect identity providers to ensure case sensitivity consistency with the authentication plugin, mitigating mismatch vulnerabilities.

prevent

Mandates naming conventions and lifecycle reviews for identifiers that enforce case-sensitive uniqueness, reducing risk of case-variant username exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

The vulnerability is a remote authentication bypass in the public-facing Jenkins OpenID Connect plugin, allowing case-based impersonation of any valid user account (including admins) to gain full access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Jenkins OpenId Connect Authentication Plugin 4.452.v2849b_d3945fa_ and earlier, except 4.438.440.v3f5f201de5dc, treats usernames as case-insensitive, allowing attackers on Jenkins instances configured with a case-sensitive OpenID Connect provider to log in as any user by providing a username that differs only in…

more

letter case, potentially gaining administrator access to Jenkins.

Deeper analysisAI

CVE-2025-24399 affects the Jenkins OpenId Connect Authentication Plugin versions 4.452.v2849b_d3945fa_ and earlier, excluding 4.438.440.v3f5f201de5dc. The vulnerability arises because the plugin treats usernames as case-insensitive, despite being configured with a case-sensitive OpenID Connect provider. This discrepancy enables attackers to authenticate as any user by submitting a username that matches the target only in letter case.

Attackers require low privileges (PR:L) on affected Jenkins instances and can exploit remotely (AV:N) with low complexity (AC:L), no user interaction (UI:N), and unchanged scope (S:U). Exploitation yields high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), with a CVSS v3.1 score of 8.8. Attackers can log in as any user, potentially including administrators, to gain full access to the Jenkins instance. It is associated with CWE-276.

The Jenkins security advisory (https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3461) states that upgrading to OpenId Connect Authentication Plugin version 4.452.v2849b_d3945fa_6 or later fixes the issue by correctly respecting case sensitivity from the OpenID Connect provider.

Details

CWE(s)

Affected Products

jenkins
openid connect authentication
≤ 4.438.440.v3f5f201de5dc · 4.444.vd4c54f157201 — 4.453.v4d7765c854f4

CVEs Like This One

CVE-2026-42520Same vendor: Jenkins
CVE-2026-42523Same vendor: Jenkins
CVE-2026-33001Same vendor: Jenkins
CVE-2025-24398Same vendor: Jenkins
CVE-2026-27099Same vendor: Jenkins
CVE-2024-57684Shared CWE-276
CVE-2024-55225Shared CWE-276
CVE-2026-42524Same vendor: Jenkins
CVE-2025-35062Shared CWE-276
CVE-2026-33002Same vendor: Jenkins

References