CVE-2025-13472

N/A Unknown

📋 TL;DR

The BlazeMeter Jenkins Plugin before version 4.27 had a missing authorization vulnerability that allowed any user to view sensitive resource lists in dropdown menus. This exposed credential IDs, BlazeMeter workspace names, and project IDs to unauthorized users. Organizations using Jenkins with the vulnerable BlazeMeter plugin are affected.

💻 Affected Systems

Products:
  • BlazeMeter Jenkins Plugin
Versions: All versions before 4.27
Operating Systems: All operating systems running Jenkins
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Jenkins with BlazeMeter plugin installed. The vulnerability is present in the Jenkins UI dropdown functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate all available credentials and BlazeMeter resources, potentially leading to credential theft, unauthorized access to BlazeMeter projects, and lateral movement within the testing infrastructure.

🟠

Likely Case

Unauthorized users can discover sensitive resource identifiers and credential names, enabling reconnaissance for further attacks and exposing organizational testing infrastructure details.

🟢

If Mitigated

With proper authorization controls, only authorized users can view resource lists, limiting exposure to legitimate administrators and users with appropriate permissions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to Jenkins UI. The vulnerability is information disclosure through UI elements rather than direct code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.27

Vendor Advisory: https://portal.perforce.com/s/cve/a91Qi000002bFgTIAU/missing-authorization-in-blazemeter-jenkins-plugin

Restart Required: Yes

Instructions:

1. Access Jenkins plugin manager. 2. Check for updates to BlazeMeter plugin. 3. Update to version 4.27 or later. 4. Restart Jenkins to apply changes.

🔧 Temporary Workarounds

Restrict Jenkins Access

all

Limit Jenkins UI access to authorized users only through network controls and authentication.

Remove Vulnerable Plugin

all

Temporarily remove BlazeMeter plugin if not essential for operations.

Manage Jenkins > Plugin Manager > Installed > BlazeMeter > Uninstall

🧯 If You Can't Patch

  • Implement strict access controls to Jenkins UI, allowing only authorized administrators
  • Monitor Jenkins access logs for unauthorized attempts to access BlazeMeter plugin pages

🔍 How to Verify

Check if Vulnerable:

Check Jenkins plugin manager for BlazeMeter plugin version. If version is below 4.27, the system is vulnerable.

Check Version:

Manage Jenkins > Plugin Manager > Installed > Search 'BlazeMeter'

Verify Fix Applied:

After updating to 4.27, verify that only users with appropriate permissions can see BlazeMeter resource dropdowns in the Jenkins UI.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to BlazeMeter plugin pages
  • Multiple requests to BlazeMeter API endpoints from unprivileged users

Network Indicators:

  • Unusual traffic patterns to Jenkins UI from unauthorized IPs

SIEM Query:

source="jenkins.log" AND ("BlazeMeter" OR "bzm") AND user!="admin"

🔗 References

📤 Share & Export