Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Oct 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jenkins
Jenkins eiffel Broadcaster |
|
CPEs | cpe:2.3:a:jenkins:eiffel_broadcaster:*:*:*:*:*:jenkins:*:* | |
Vendors & Products |
Jenkins
Jenkins eiffel Broadcaster |
Thu, 20 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-863 | |
Metrics |
cvssV3_1
|
Tue, 18 Feb 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-276 | |
Metrics |
cvssV3_1
|
Thu, 23 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-276 | |
Metrics |
cvssV3_1
|
Wed, 22 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Jenkins Eiffel Broadcaster Plugin 2.8.0 through 2.10.2 (both inclusive) uses the credential ID as the cache key during signing operations, allowing attackers able to create a credential with the same ID as a legitimate one in a different credentials store to sign an event published to RabbitMQ with the legitimate credentials. | |
References |
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-03-20T14:05:53.434Z
Reserved: 2025-01-21T12:41:49.875Z
Link: CVE-2025-24400

Updated: 2025-01-23T14:43:45.826Z

Status : Analyzed
Published: 2025-01-22T17:15:13.943
Modified: 2025-10-03T00:16:56.237
Link: CVE-2025-24400

No data.

No data.