Friday, April 11, 2025
HomeCVE/vulnerabilityMultiple Jenkins Plugin Vulnerabilities Expose Sensitive Information to Attackers

Multiple Jenkins Plugin Vulnerabilities Expose Sensitive Information to Attackers

Published on

SIEM as a Service

Follow Us on Google News

Jenkins, the widely used open-source automation server, faces heightened security risks after researchers disclosed 11 critical vulnerabilities across its core software and eight plugins.

These flaws expose sensitive data, enable code execution, and allow unauthorized configuration changes.

Key Vulnerabilities and Risks

  1. High-Severity Sandbox Bypass (CVE-2025-31722)
    The Templating Engine Plugin (≤2.5.3) allows attackers with Item/Configure permissions to execute arbitrary code on Jenkins controllers through folder-scoped libraries. This vulnerability carries a CVSS score of 9.1.
  2. Agent Configuration Leaks (CVE-2025-31720, CVE-2025-31721)
    Jenkins core (≤2.503) lets attackers with Computer/Create permissions steal agent configurations and secrets like API keys or passwords due to missing permission checks.
  3. Plaintext Credential Storage
    Plugins like Cadence vManager (CVE-2025-31724), Stack Hammer (CVE-2025-31726), and AsakusaSatellite (CVE-2025-31727/31728) store API keys/passwords unencrypted in job config files.
  4. CSRF in Simple Queue Plugin (CVE-2025-31723)
    Attackers manipulate build queues via forged requests.

Affected Products and CVEs

Affected ProductCVE IDsSeverityAffected VersionsFixed Version
Jenkins CoreCVE-2025-31720Medium≤2.503 (Weekly), ≤2.492.2 (LTS)2.504 (Weekly), 2.492.3 (LTS)
Jenkins CoreCVE-2025-31721Medium≤2.503 (Weekly), ≤2.492.2 (LTS)2.504 (Weekly), 2.492.3 (LTS)
Templating Engine PluginCVE-2025-31722High≤2.5.32.5.4
Simple Queue PluginCVE-2025-31723Medium≤1.4.61.4.7
Cadence vManager PluginCVE-2025-31724Medium≤4.0.0-282.v5096a_c2db_2754.0.1-286.v9e25a_740b_a_48
monitor-remote-job PluginCVE-2025-31725Medium≤1.0None (Unfixed)
Stack Hammer PluginCVE-2025-31726Medium≤1.0.6None (Unfixed)
AsakusaSatellite PluginCVE-2025-31727/31728Medium≤0.1.1None (Unfixed)

Mitigation Steps

- Advertisement - Google News
  1. Update Immediately:
    • Upgrade Jenkins weekly to 2.504 or LTS to 2.492.3.
    • Patch plugins like Templating Engine (2.5.4) and Simple Queue (1.4.7).
  2. Restrict Permissions:
    Limit Computer/Create and Item/Configure access to minimize attack surfaces.
  3. Monitor Unfixed Plugins:
    For monitor-remote-job, Stack Hammer, and AsakusaSatellite, restrict file system access to config.xml files until patches arrive.
  4. Audit Logs:
    Check for unauthorized queue changes or unexpected agent configurations.

Jenkins has not yet provided fixes for three plugins, urging administrators to disable non-essential functionalities.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...