Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAKG2iZhP6ZSrAezY+98AAU6foE5Ed7bV5B1q1u3XeGNmYfiLEQ@mail.gmail.com>
Date: Wed, 10 Dec 2025 16:43:44 +0100
From: Kevin Guerroudj <kguerroudj@...udbees.com>
To: oss-security@...ts.openwall.com
Subject: Multiple vulnerabilities in Jenkins and Jenkins plugins

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software.

The following releases contain fixes for security vulnerabilities:

* Jenkins 2.541
* Jenkins LTS 2.528.3
* BlazeMeter Plugin 4.27
* Coverage Plugin 2.3056.v1dfe888b_0249
* Git client Plugin 6.4.1

Additionally, we announce unresolved security issues in the following
plugins:

* HashiCorp Vault Plugin
* Redpen - Pipeline Reporter for Jira Plugin

Summaries of the vulnerabilities are below. More details, severity, and
attribution can be found here:
https://www.jenkins.io/security/advisory/2025-12-10/

We provide advance notification for security updates on this mailing list:
https://groups.google.com/d/forum/jenkinsci-advisories

If you discover security vulnerabilities in Jenkins, please report them as
described here:
https://www.jenkins.io/security/#reporting-vulnerabilities

---

SECURITY-3630 / CVE-2025-67635
Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not properly close
HTTP-based CLI connections when the connection stream becomes corrupted.

This allows unauthenticated attackers to cause a denial of service by
creating HTTP-based CLI connection requests, resulting in request-handling
threads waiting indefinitely.


SECURITY-1809 / CVE-2025-67636
Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not perform a
permission check to determine whether a password field should be redacted
in views.

This allows attackers with View/Read permission to view encrypted password
values in views.

NOTE: The regular view configuration form requires View/Configure
permission to access. This vulnerability requires that a plugin implements
a page for a view that shows a password field without performing a
View/Configure permission check, and does not set the `readOnlyMode`
variable introduced to support JEP-224. As of the publication of this
advisory, the Jenkins security team is not aware of any exploitable
implementation.


SECURITY-783 / CVE-2025-67637 (storage) & CVE-2025-67638 (masking)
Jenkins 2.540 and earlier, LTS 2.528.2 and earlier stores build
authorization tokens unencrypted in job `config.xml` files on the Jenkins
controller.

These tokens can be viewed by users with Item/Extended Read permission or
access to the Jenkins controller file system.

Additionally, the job configuration form does not mask these tokens,
increasing the potential for attackers to observe and capture them.


SECURITY-1166 / CVE-2025-67639
Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not require a
cross-site request forgery (CSRF) token (crumb) for the URL handling
interactive login HTTP requests, resulting in a cross-site request forgery
(CSRF) vulnerability.

This vulnerability allows attackers to trick users into logging in to the
attacker's account.


SECURITY-3614 / CVE-2025-67640
Git client Plugin generates temporary script files to provide credentials
(e.g., `SSH_ASKPASS`).

In Git client Plugin 6.4.0 and earlier, these script files contain the path
to the workspace directory as part of a command argument. This argument is
not correctly escaped, allowing attackers able to control the workspace
directory name to inject arbitrary OS commands.

NOTE: This vulnerability only has an impact when attackers can control
working directories (e.g., the argument to the `dir(…)` Pipeline step)
while not being able to control the Pipeline itself or the programs or
build scripts it executes.


SECURITY-3611 / CVE-2025-67641
Coverage Plugin uses coverage results IDs to create the links to coverage
results on the Jenkins UI.

Coverage Plugin 2.3054.ve1ff7b_a_a_123b_ and earlier does not validate the
configured coverage results ID when creating coverage results, only when
submitting the job configuration through the UI. This allows attackers with
Item/Configure permission to use a `javascript:` scheme URL as identifier
by configuring the job through the REST API, resulting in a stored
cross-site scripting (XSS) vulnerability.

NOTE: This vulnerability is not exploitable on Jenkins 2.539 or newer with
Content Security Policy protection enforced.


SECURITY-3045 / CVE-2025-67642
HashiCorp Vault Plugin 371.v884a_4dd60fb_6 and earlier does not set the
appropriate context for Vault credentials lookup, allowing the use of
System-scoped credentials otherwise reserved for the global configuration.

This allows attackers with Item/Configure permission to access and
potentially capture Vault credentials they are not entitled to.

As of publication of this advisory, there is no fix.


SECURITY-3091 / CVE-2025-13472
BlazeMeter Plugin 4.26 and earlier does not perform a permission check in
an HTTP endpoint.

This allows attackers with Overall/Read permission to enumerate credentials
IDs of credentials stored in Jenkins. Those can be used as part of an
attack to capture the credentials using another vulnerability.


SECURITY-3290 / CVE-2025-67643
Redpen - Pipeline Reporter for Jira Plugin 1.054.v7b_9517b_6b_202 and
earlier does not correctly perform path validation of the workspace
directory while uploading artifacts to Jira.

Additionally, Redpen - Pipeline Reporter for Jira Plugin does not support
distributed builds, causing artifact uploads to occur from the Jenkins
controller rather than from the agent executing the build.

This results in a path traversal vulnerability, allowing attackers with
Item/Configure permission to retrieve files present on the Jenkins
controller workspace directory.

As of publication of this advisory, there is no fix.

-- 
CONFIDENTIALITY NOTICE:_ This email and any attachments contain 
confidential and proprietary information of CloudBees intended only for the 
named recipient(s). Unauthorized use or distribution is prohibited. If you 
received this in error, please notify the sender and delete this email._

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.