Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-jj9c-e7k7-aqea
Vulnerability ID VCID-jj9c-e7k7-aqea
Aliases CVE-2022-25176
GHSA-6473-gqrj-4p65
Summary Improper Link Resolution Before File Access ('Link Following') Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers able to configure Pipelines to read arbitrary files on the Jenkins controller file system.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25176.json
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-25176
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-6473-gqrj-4p65
cvssv3.1 6.5 https://github.com/jenkinsci/workflow-cps-plugin
generic_textual MODERATE https://github.com/jenkinsci/workflow-cps-plugin
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2022-25176
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2022-25176
cvssv3.1 6.5 https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613
generic_textual MODERATE https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613
ssvc Track https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25176.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/jenkinsci/workflow-cps-plugin
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-25176
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:28Z/ Found at https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613
Exploit Prediction Scoring System (EPSS)
Percentile 0.70545
EPSS Score 0.00642
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:49:35.105338+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.plugins.workflow/workflow-cps/CVE-2022-25176.yml 38.0.0