CVE-2025-64131Authentication Bypass by Capture-replay in Jenkins Saml

Severity
7.5HIGHNVD
EPSS
0.0%
top 92.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 29

Description

Jenkins SAML Plugin 4.583.vc68232f7018a_ and earlier does not implement a replay cache, allowing attackers able to obtain information about the SAML authentication flow between a user's web browser and Jenkins to replay those requests, authenticating to Jenkins as that user.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages2 packages

CVEListV5jenkins_project/jenkins_saml_plugin4.583.vc68232f7018a_
NVDjenkins/saml< 4.583.585.v22ccc1139f55

🔴Vulnerability Details

3
CVEList
CVE-2025-64131: Jenkins SAML Plugin 42025-10-29
GHSA
Jenkins SAML Plugin does not implement a replay cache2025-10-29
OSV
Jenkins SAML Plugin does not implement a replay cache2025-10-29

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2025-10-292025-10-29
CVE-2025-64131 — Jenkins Saml vulnerability | cvebase