Vulnerability Details CVE-2025-64131
Jenkins SAML Plugin 4.583.vc68232f7018a_ and earlier does not implement a replay cache, allowing attackers able to obtain information about the SAML authentication flow between a user's web browser and Jenkins to replay those requests, authenticating to Jenkins as that user.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 12.5%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2025-64131
-
cpe:2.3:a:jenkins:saml:0.1
-
cpe:2.3:a:jenkins:saml:0.10
-
cpe:2.3:a:jenkins:saml:0.11
-
cpe:2.3:a:jenkins:saml:0.12
-
cpe:2.3:a:jenkins:saml:0.13
-
cpe:2.3:a:jenkins:saml:0.14
-
cpe:2.3:a:jenkins:saml:0.2
-
cpe:2.3:a:jenkins:saml:0.3
-
cpe:2.3:a:jenkins:saml:0.4
-
cpe:2.3:a:jenkins:saml:0.5
-
cpe:2.3:a:jenkins:saml:0.6
-
cpe:2.3:a:jenkins:saml:0.7
-
cpe:2.3:a:jenkins:saml:0.8
-
cpe:2.3:a:jenkins:saml:0.9
-
cpe:2.3:a:jenkins:saml:1.0.0
-
cpe:2.3:a:jenkins:saml:1.0.1
-
cpe:2.3:a:jenkins:saml:1.0.2
-
cpe:2.3:a:jenkins:saml:1.0.3
-
cpe:2.3:a:jenkins:saml:1.0.4
-
cpe:2.3:a:jenkins:saml:1.0.5
-
cpe:2.3:a:jenkins:saml:1.0.6
-
cpe:2.3:a:jenkins:saml:1.0.7
-
cpe:2.3:a:jenkins:saml:1.0.8
-
cpe:2.3:a:jenkins:saml:1.0.9
-
cpe:2.3:a:jenkins:saml:1.1.0
-
cpe:2.3:a:jenkins:saml:1.1.1
-
cpe:2.3:a:jenkins:saml:1.1.2
-
cpe:2.3:a:jenkins:saml:1.1.3
-
cpe:2.3:a:jenkins:saml:1.1.4
-
cpe:2.3:a:jenkins:saml:1.1.5
-
cpe:2.3:a:jenkins:saml:1.1.6
-
cpe:2.3:a:jenkins:saml:1.1.7
-
cpe:2.3:a:jenkins:saml:1.1.8
-
cpe:2.3:a:jenkins:saml:2.0.0
-
cpe:2.3:a:jenkins:saml:2.0.1
-
cpe:2.3:a:jenkins:saml:2.0.2
-
cpe:2.3:a:jenkins:saml:2.0.3
-
cpe:2.3:a:jenkins:saml:2.0.3.1
-
cpe:2.3:a:jenkins:saml:2.0.5
-
cpe:2.3:a:jenkins:saml:2.0.6
-
cpe:2.3:a:jenkins:saml:2.0.7
-
cpe:2.3:a:jenkins:saml:2.0.8