Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-14888 | Jenkins DingTalk Plugin Unconditionally Disables SSL/TLS Certificate and Hostname Validation |
Github GHSA |
GHSA-cp9r-g575-xc5f | Jenkins DingTalk Plugin Unconditionally Disables SSL/TLS Certificate and Hostname Validation |
Thu, 12 Jun 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins
Jenkins dingtalk |
|
| CPEs | cpe:2.3:a:jenkins:dingtalk:*:*:*:*:*:jenkins:*:* | |
| Vendors & Products |
Jenkins
Jenkins dingtalk |
Thu, 15 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 | |
| Metrics |
cvssV3_1
|
Wed, 14 May 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jenkins DingTalk Plugin 2.7.3 and earlier unconditionally disables SSL/TLS certificate and hostname validation for connections to the configured DingTalk webhooks. | |
| References |
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-05-15T13:24:31.285Z
Reserved: 2025-05-13T12:21:13.541Z
Link: CVE-2025-47888
Updated: 2025-05-15T13:24:22.533Z
Status : Analyzed
Published: 2025-05-14T21:15:59.747
Modified: 2025-06-12T13:26:33.590
Link: CVE-2025-47888
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA