Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  Github GHSA | GHSA-3jw2-5hjg-hc2c | Jenkins Extensible Choice Parameter Plugin vulnerable to cross-site request forgery | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 30 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Jenkins Jenkins jenkins | |
| Vendors & Products | Jenkins Jenkins jenkins | 
Wed, 29 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-352 | |
| Metrics | cvssV3_1 
 
 | 
Wed, 29 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A cross-site request forgery (CSRF) vulnerability in Jenkins Extensible Choice Parameter Plugin 239.v5f5c278708cf and earlier allows attackers to execute sandboxed Groovy code. | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-10-29T14:06:29.266Z
Reserved: 2025-10-28T07:34:37.541Z
Link: CVE-2025-64133
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-29T14:06:22.117Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-29T14:15:57.463
Modified: 2025-10-30T15:03:13.440
Link: CVE-2025-64133
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    Updated: 2025-10-30T14:38:28Z