{ "schema_version": "1.4.0", "id": "GHSA-hcfh-qjcp-34q9", "modified": "2025-04-02T22:43:30Z", "published": "2025-04-02T15:31:38Z", "aliases": [ "CVE-2025-31723" ], "summary": "Jenkins Simple Queue Plugin Cross-Site Request Forgery (CSRF)", "details": "Jenkins Simple Queue Plugin 1.4.6 and earlier does not require POST requests for multiple HTTP endpoints, resulting in cross-site request forgery (CSRF) vulnerabilities.\n\nThese vulnerabilities allow attackers to change and reset the build queue order.\n\nSimple Queue Plugin 1.4.7 requires POST requests for the affected HTTP endpoints.\n\nAdministrators can enable equivalent HTTP endpoints without CSRF protection via the global configuration.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "affected": [ { "package": { "ecosystem": "Maven", "name": "io.jenkins.plugins:simple-queue" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "1.4.7" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31723" }, { "type": "WEB", "url": "https://github.com/jenkinsci/simple-queue-plugin/commit/c1094666dcd139830620d6d1c21b13f847601e74" }, { "type": "PACKAGE", "url": "https://github.com/jenkinsci/simple-queue-plugin" }, { "type": "WEB", "url": "https://www.jenkins.io/security/advisory/2025-04-02/#SECURITY-3469" } ], "database_specific": { "cwe_ids": [ "CWE-352" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-04-02T22:43:30Z", "nvd_published_at": "2025-04-02T15:15:59Z" } }