CVE-2025-22223 Affecting jenkins-2.492 package, versions <2.492.2-r2


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-JENKINS2492-9538165
  • published27 Mar 2025
  • disclosed24 Mar 2025

Introduced: 24 Mar 2025

CVE-2025-22223  (opens in a new tab)

How to fix?

Upgrade Chainguard jenkins-2.492 to version 2.492.2-r2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jenkins-2.492 package and not the jenkins-2.492 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Spring Security 6.4.0 - 6.4.3 may not correctly locate method security annotations on parameterized types or methods. This may cause an authorization bypass. 

You are not affected if you are not using @EnableMethodSecurity, or you do not have method security annotations on parameterized types or methods, or all method security annotations are attached to target methods

CVSS Base Scores

version 3.1