Sunday, April 6, 2025
HomeCVE/vulnerabilityMultiple Jenkins Plugin Vulnerabilities Expose Sensitive Information to Attackers

Multiple Jenkins Plugin Vulnerabilities Expose Sensitive Information to Attackers

Published on

SIEM as a Service

Follow Us on Google News

Jenkins, the widely used open-source automation server, faces heightened security risks after researchers disclosed 11 critical vulnerabilities across its core software and eight plugins.

These flaws expose sensitive data, enable code execution, and allow unauthorized configuration changes.

Key Vulnerabilities and Risks

  1. High-Severity Sandbox Bypass (CVE-2025-31722)
    The Templating Engine Plugin (≤2.5.3) allows attackers with Item/Configure permissions to execute arbitrary code on Jenkins controllers through folder-scoped libraries. This vulnerability carries a CVSS score of 9.1.
  2. Agent Configuration Leaks (CVE-2025-31720, CVE-2025-31721)
    Jenkins core (≤2.503) lets attackers with Computer/Create permissions steal agent configurations and secrets like API keys or passwords due to missing permission checks.
  3. Plaintext Credential Storage
    Plugins like Cadence vManager (CVE-2025-31724), Stack Hammer (CVE-2025-31726), and AsakusaSatellite (CVE-2025-31727/31728) store API keys/passwords unencrypted in job config files.
  4. CSRF in Simple Queue Plugin (CVE-2025-31723)
    Attackers manipulate build queues via forged requests.

Affected Products and CVEs

Affected ProductCVE IDsSeverityAffected VersionsFixed Version
Jenkins CoreCVE-2025-31720Medium≤2.503 (Weekly), ≤2.492.2 (LTS)2.504 (Weekly), 2.492.3 (LTS)
Jenkins CoreCVE-2025-31721Medium≤2.503 (Weekly), ≤2.492.2 (LTS)2.504 (Weekly), 2.492.3 (LTS)
Templating Engine PluginCVE-2025-31722High≤2.5.32.5.4
Simple Queue PluginCVE-2025-31723Medium≤1.4.61.4.7
Cadence vManager PluginCVE-2025-31724Medium≤4.0.0-282.v5096a_c2db_2754.0.1-286.v9e25a_740b_a_48
monitor-remote-job PluginCVE-2025-31725Medium≤1.0None (Unfixed)
Stack Hammer PluginCVE-2025-31726Medium≤1.0.6None (Unfixed)
AsakusaSatellite PluginCVE-2025-31727/31728Medium≤0.1.1None (Unfixed)

Mitigation Steps

  1. Update Immediately:
    • Upgrade Jenkins weekly to 2.504 or LTS to 2.492.3.
    • Patch plugins like Templating Engine (2.5.4) and Simple Queue (1.4.7).
  2. Restrict Permissions:
    Limit Computer/Create and Item/Configure access to minimize attack surfaces.
  3. Monitor Unfixed Plugins:
    For monitor-remote-job, Stack Hammer, and AsakusaSatellite, restrict file system access to config.xml files until patches arrive.
  4. Audit Logs:
    Check for unauthorized queue changes or unexpected agent configurations.

Jenkins has not yet provided fixes for three plugins, urging administrators to disable non-essential functionalities.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...