Jenkins MCP Server Plugin 0.84.v50ca_24ef83f2 and earlier does not perform permission checks in several MCP tools.
This allows to do the following:
Attackers with Item/Read permission can obtain information about the configured SCM in a job despite lacking Item/Extended Read permission (getJobScm).
Attackers with Item/Read permission can trigger new builds of a job despite lacking Item/Build permission (triggerBuild).
Attackers without Overall/Read permission can retrieve the names of configured clouds (getStatus).
MCP Server Plugin 0.86.v7d3355e6aa18 performs permission checks for the affected MCP tools.
{
"nvd_published_at": "2025-10-29T14:15:57Z",
"severity": "MODERATE",
"cwe_ids": [
"CWE-862"
],
"github_reviewed": true,
"github_reviewed_at": "2025-10-29T18:52:20Z"
}