Cyber Security News

Multiple Jenkins Plugin Vulnerabilities Expose Sensitive Information to Attackers

Jenkins, the widely used open-source automation server, faces heightened security risks after researchers disclosed 11 critical vulnerabilities across its core software and eight plugins.

These flaws expose sensitive data, enable code execution, and allow unauthorized configuration changes.

Key Vulnerabilities and Risks

  1. High-Severity Sandbox Bypass (CVE-2025-31722)
    The Templating Engine Plugin (≤2.5.3) allows attackers with Item/Configure permissions to execute arbitrary code on Jenkins controllers through folder-scoped libraries. This vulnerability carries a CVSS score of 9.1.
  2. Agent Configuration Leaks (CVE-2025-31720, CVE-2025-31721)
    Jenkins core (≤2.503) lets attackers with Computer/Create permissions steal agent configurations and secrets like API keys or passwords due to missing permission checks.
  3. Plaintext Credential Storage
    Plugins like Cadence vManager (CVE-2025-31724), Stack Hammer (CVE-2025-31726), and AsakusaSatellite (CVE-2025-31727/31728) store API keys/passwords unencrypted in job config files.
  4. CSRF in Simple Queue Plugin (CVE-2025-31723)
    Attackers manipulate build queues via forged requests.

Affected Products and CVEs

Affected ProductCVE IDsSeverityAffected VersionsFixed Version
Jenkins CoreCVE-2025-31720Medium≤2.503 (Weekly), ≤2.492.2 (LTS)2.504 (Weekly), 2.492.3 (LTS)
Jenkins CoreCVE-2025-31721Medium≤2.503 (Weekly), ≤2.492.2 (LTS)2.504 (Weekly), 2.492.3 (LTS)
Templating Engine PluginCVE-2025-31722High≤2.5.32.5.4
Simple Queue PluginCVE-2025-31723Medium≤1.4.61.4.7
Cadence vManager PluginCVE-2025-31724Medium≤4.0.0-282.v5096a_c2db_2754.0.1-286.v9e25a_740b_a_48
monitor-remote-job PluginCVE-2025-31725Medium≤1.0None (Unfixed)
Stack Hammer PluginCVE-2025-31726Medium≤1.0.6None (Unfixed)
AsakusaSatellite PluginCVE-2025-31727/31728Medium≤0.1.1None (Unfixed)

Mitigation Steps

  1. Update Immediately:
    • Upgrade Jenkins weekly to 2.504 or LTS to 2.492.3.
    • Patch plugins like Templating Engine (2.5.4) and Simple Queue (1.4.7).
  2. Restrict Permissions:
    Limit Computer/Create and Item/Configure access to minimize attack surfaces.
  3. Monitor Unfixed Plugins:
    For monitor-remote-job, Stack Hammer, and AsakusaSatellite, restrict file system access to config.xml files until patches arrive.
  4. Audit Logs:
    Check for unauthorized queue changes or unexpected agent configurations.

Jenkins has not yet provided fixes for three plugins, urging administrators to disable non-essential functionalities.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

1 day ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

1 day ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

1 day ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

1 day ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

1 day ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

2 days ago