Jenkins, the widely used open-source automation server, faces heightened security risks after researchers disclosed 11 critical vulnerabilities across its core software and eight plugins.
These flaws expose sensitive data, enable code execution, and allow unauthorized configuration changes.
Affected Product | CVE IDs | Severity | Affected Versions | Fixed Version |
Jenkins Core | CVE-2025-31720 | Medium | ≤2.503 (Weekly), ≤2.492.2 (LTS) | 2.504 (Weekly), 2.492.3 (LTS) |
Jenkins Core | CVE-2025-31721 | Medium | ≤2.503 (Weekly), ≤2.492.2 (LTS) | 2.504 (Weekly), 2.492.3 (LTS) |
Templating Engine Plugin | CVE-2025-31722 | High | ≤2.5.3 | 2.5.4 |
Simple Queue Plugin | CVE-2025-31723 | Medium | ≤1.4.6 | 1.4.7 |
Cadence vManager Plugin | CVE-2025-31724 | Medium | ≤4.0.0-282.v5096a_c2db_275 | 4.0.1-286.v9e25a_740b_a_48 |
monitor-remote-job Plugin | CVE-2025-31725 | Medium | ≤1.0 | None (Unfixed) |
Stack Hammer Plugin | CVE-2025-31726 | Medium | ≤1.0.6 | None (Unfixed) |
AsakusaSatellite Plugin | CVE-2025-31727/31728 | Medium | ≤0.1.1 | None (Unfixed) |
Mitigation Steps
Jenkins has not yet provided fixes for three plugins, urging administrators to disable non-essential functionalities.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…
Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…
Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…
Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…
The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…
Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…