Search for vulnerabilities
| Vulnerability ID | VCID-chux-mqkp-cfe5 |
| Aliases |
CVE-2022-25178
GHSA-5hfv-mg5x-mv32 |
| Summary | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier does not restrict the names of resources passed to the libraryResource step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 6.2 |
| Risk | 3.1 |
| Affected and Fixed Packages | Package Details |
| Reference id | Reference type | URL |
|---|---|---|
| https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25178.json | ||
| https://api.first.org/data/v1/epss?cve=CVE-2022-25178 | ||
| https://github.com/jenkinsci/workflow-cps-global-lib-plugin | ||
| https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613 | ||
| 2055789 | https://bugzilla.redhat.com/show_bug.cgi?id=2055789 | |
| CVE-2022-25178 | https://nvd.nist.gov/vuln/detail/CVE-2022-25178 | |
| GHSA-5hfv-mg5x-mv32 | https://github.com/advisories/GHSA-5hfv-mg5x-mv32 | |
| RHSA-2022:0871 | https://access.redhat.com/errata/RHSA-2022:0871 | |
| RHSA-2022:1021 | https://access.redhat.com/errata/RHSA-2022:1021 | |
| RHSA-2022:1025 | https://access.redhat.com/errata/RHSA-2022:1025 | |
| RHSA-2022:1248 | https://access.redhat.com/errata/RHSA-2022:1248 | |
| RHSA-2022:1420 | https://access.redhat.com/errata/RHSA-2022:1420 | |
| RHSA-2022:1620 | https://access.redhat.com/errata/RHSA-2022:1620 |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.52835 |
| EPSS Score | 0.00296 |
| Published At | April 2, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T12:49:34.988711+00:00 | GitLab Importer | Import | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.plugins.workflow/workflow-cps-global-lib/CVE-2022-25178.yml | 38.0.0 |