Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-41255: Vulnerability in Jenkins project Jenkins CONS3RT Plugin

0
Medium
VulnerabilityCVE-2022-41255cvecve-2022-41255
Published: Wed Sep 21 2022 (09/21/2022, 15:46:12 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins project
Product: Jenkins CONS3RT Plugin

Description

Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

AI-Powered Analysis

AILast updated: 07/07/2025, 09:12:09 UTC

Technical Analysis

CVE-2022-41255 is a vulnerability found in the Jenkins CONS3RT Plugin version 1.0.0 and earlier. The issue arises because the plugin stores the Cons3rt API token unencrypted within the job configuration files (config.xml) on the Jenkins controller. These configuration files are accessible to users who have file system access to the Jenkins controller server. Since the API token is stored in plaintext, any user with such access can view and potentially misuse the token. The vulnerability is classified under CWE-522, which relates to the storage of credentials in a recoverable format. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). This means an attacker with some level of privileges on the Jenkins controller can remotely exploit this vulnerability without user interaction to obtain sensitive credentials, potentially leading to unauthorized access to the Cons3rt API and related systems. No known exploits are reported in the wild, and no patches are currently linked, suggesting that mitigation requires manual intervention or plugin updates once available.

Potential Impact

For European organizations using Jenkins with the CONS3RT Plugin, this vulnerability poses a significant risk to the confidentiality of their API tokens, which could be leveraged to access and manipulate Cons3rt-managed resources or infrastructure. Since Jenkins is widely used in CI/CD pipelines across Europe, exposure of API tokens can lead to unauthorized actions such as deployment of malicious code, data exfiltration, or disruption of automated workflows. The impact is particularly critical for organizations relying on Cons3rt for infrastructure orchestration or security testing, as attackers gaining API access could compromise the integrity of their development and operational environments. Additionally, unauthorized access could lead to compliance violations under GDPR if sensitive data or systems are affected. The requirement for privileged access to the Jenkins controller file system somewhat limits the attack surface but does not eliminate risk, especially in environments where multiple users have elevated access or where attackers have already gained foothold through other means.

Mitigation Recommendations

European organizations should immediately audit access controls to their Jenkins controller file systems to ensure that only trusted administrators have access. Restricting file system permissions to prevent unauthorized users from reading job configuration files is critical. Organizations should also consider encrypting sensitive data at rest, including API tokens, either by updating to a newer plugin version that addresses this vulnerability or by implementing custom encryption mechanisms for stored credentials. Regularly rotating Cons3rt API tokens and monitoring their usage can help detect and limit potential misuse. Additionally, organizations should isolate Jenkins controllers in secure network segments and employ strong authentication and authorization controls to reduce the risk of privilege escalation. Until an official patch is released, disabling or removing the CONS3RT Plugin if not essential can be a temporary mitigation. Finally, monitoring Jenkins logs and system access logs for suspicious activity related to configuration file access is recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2022-09-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68371a22182aa0cae24f8ae8

Added to database: 5/28/2025, 2:13:54 PM

Last enriched: 7/7/2025, 9:12:09 AM

Last updated: 2/7/2026, 9:04:22 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats