Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58458: Vulnerability in Jenkins Project Jenkins Git client Plugin

0
Medium
VulnerabilityCVE-2025-58458cvecve-2025-58458
Published: Wed Sep 03 2025 (09/03/2025, 15:02:26 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins Project
Product: Jenkins Git client Plugin

Description

In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

AI-Powered Analysis

AILast updated: 09/10/2025, 20:25:55 UTC

Technical Analysis

CVE-2025-58458 is a medium-severity vulnerability affecting the Jenkins Git client Plugin versions 6.3.2 and earlier, excluding versions 6.1.4 and 6.2.1. The vulnerability arises from a difference in Git URL field form validation responses when the 'amazon-s3' protocol is specified for use with JGit. Specifically, the plugin's validation behavior varies depending on whether a specified file path exists on the Jenkins controller's file system. This discrepancy allows an attacker with Overall or Read permissions in Jenkins to infer the existence of arbitrary file paths on the controller by observing the validation responses. This is essentially an information disclosure vulnerability related to file existence on the Jenkins controller. The vulnerability does not allow modification or deletion of files, nor does it impact availability directly. Exploitation requires the attacker to have at least read-level access to the Jenkins instance, but no user interaction is needed beyond that. The CVSS v3.1 base score is 4.3 (medium), reflecting the network attack vector, low complexity, required privileges, and limited confidentiality impact. The vulnerability is categorized under CWE-538 (File and Directory Information Exposure) and CWE-200 (Information Exposure). No public exploits or patches are currently known or linked, indicating that the vulnerability is newly disclosed and may not yet be actively exploited in the wild. However, given Jenkins' widespread use in continuous integration and deployment pipelines, this vulnerability could be leveraged for reconnaissance by attackers to gather sensitive information about the Jenkins controller's file system structure, potentially aiding further attacks.

Potential Impact

For European organizations using Jenkins with the affected Git client Plugin versions, this vulnerability poses a risk of information leakage about the Jenkins controller's file system. While the direct impact is limited to confidentiality, the disclosed information could enable attackers to identify sensitive files or configurations, facilitating subsequent targeted attacks such as privilege escalation or lateral movement within the network. Organizations relying heavily on Jenkins for software development and deployment, especially those with complex or sensitive build environments, may face increased risk if attackers gain read access to Jenkins. Since exploitation requires at least read permissions, insider threats or compromised Jenkins user accounts could be leveraged to exploit this vulnerability. The impact is more pronounced in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, common in Europe. Although the vulnerability does not affect system integrity or availability directly, the potential for information disclosure can undermine trust in the CI/CD pipeline security and may lead to compliance issues under regulations like GDPR if sensitive information is exposed.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Immediately audit Jenkins instances to identify versions of the Git client Plugin in use and upgrade to versions not affected by this vulnerability (notably 6.1.4, 6.2.1, or later patched versions once available). 2) Restrict Jenkins user permissions rigorously, ensuring that only trusted users have Overall or Read permissions, minimizing the attack surface. 3) Implement network segmentation and access controls to limit exposure of Jenkins controllers to untrusted networks or users. 4) Monitor Jenkins logs for unusual validation requests or access patterns that could indicate exploitation attempts. 5) Employ security scanning tools to detect outdated plugins and automate patch management for Jenkins components. 6) Consider additional hardening of the Jenkins controller host, including file system permissions and intrusion detection systems, to detect or prevent unauthorized file access attempts. 7) Stay updated with Jenkins security advisories for patches or further guidance related to this vulnerability. These measures go beyond generic advice by focusing on permission management, monitoring, and proactive patching tailored to Jenkins environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2025-09-02T12:44:16.983Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b85c1aad5a09ad00f77808

Added to database: 9/3/2025, 3:17:46 PM

Last enriched: 9/10/2025, 8:25:55 PM

Last updated: 10/19/2025, 7:48:28 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats