CVE-2025-58458: Vulnerability in Jenkins Project Jenkins Git client Plugin
In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
AI Analysis
Technical Summary
CVE-2025-58458 is a vulnerability identified in the Jenkins Git client Plugin, specifically affecting versions 6.3.2 and earlier except for 6.1.4 and 6.2.1. The flaw is rooted in the Git URL field form validation logic when the amazon-s3 protocol is specified for use with JGit. The validation responses differ depending on whether a specified file path exists on the Jenkins controller's filesystem. This difference allows an attacker who has Overall or Read permission on the Jenkins instance to perform a file existence check on arbitrary paths on the controller. The vulnerability is classified under CWE-538 (File and Directory Information Exposure) and CWE-200 (Information Exposure). The CVSS v3.1 base score is 4.3, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and impacting confidentiality only. The vulnerability does not allow code execution, integrity compromise, or availability disruption but can be used for reconnaissance to identify sensitive files or configuration data on the Jenkins controller. No patches or fixed versions are explicitly listed in the provided data, but affected users are advised to upgrade to versions that do not exhibit this behavior. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in the form of information disclosure. Attackers with read-level access to Jenkins can leverage this flaw to enumerate files on the Jenkins controller, potentially revealing sensitive configuration files, credentials, or other critical data stored on the server. This reconnaissance capability can facilitate further targeted attacks, privilege escalation, or lateral movement within the network. Organizations relying heavily on Jenkins for continuous integration and deployment, especially those managing sensitive or regulated data, may face increased risk of data leakage. While the vulnerability does not directly compromise system integrity or availability, the exposure of file existence information can weaken the overall security posture. The requirement for authenticated access limits exploitation to insiders or attackers who have already compromised low-level credentials, but the ease of exploitation (low complexity) and network accessibility make it a notable concern. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
To mitigate CVE-2025-58458, European organizations should: 1) Upgrade the Jenkins Git client Plugin to a version that is not vulnerable, specifically avoiding versions 6.3.2 and earlier except 6.1.4 and 6.2.1, once a fixed version is released by the Jenkins Project. 2) Restrict Jenkins access strictly to trusted users and enforce the principle of least privilege, ensuring that only necessary personnel have Overall or Read permissions. 3) Implement network segmentation and firewall rules to limit access to Jenkins controllers from untrusted networks. 4) Monitor Jenkins logs for unusual access patterns or repeated file existence checks that could indicate exploitation attempts. 5) Consider disabling or restricting the use of the amazon-s3 protocol in Git URLs if not required. 6) Regularly audit Jenkins plugin versions and configurations as part of vulnerability management. 7) Employ multi-factor authentication (MFA) for Jenkins user accounts to reduce the risk of credential compromise. These steps go beyond generic advice by focusing on access control hardening, monitoring, and configuration adjustments specific to the vulnerability's exploitation vector.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-58458: Vulnerability in Jenkins Project Jenkins Git client Plugin
Description
In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
AI-Powered Analysis
Technical Analysis
CVE-2025-58458 is a vulnerability identified in the Jenkins Git client Plugin, specifically affecting versions 6.3.2 and earlier except for 6.1.4 and 6.2.1. The flaw is rooted in the Git URL field form validation logic when the amazon-s3 protocol is specified for use with JGit. The validation responses differ depending on whether a specified file path exists on the Jenkins controller's filesystem. This difference allows an attacker who has Overall or Read permission on the Jenkins instance to perform a file existence check on arbitrary paths on the controller. The vulnerability is classified under CWE-538 (File and Directory Information Exposure) and CWE-200 (Information Exposure). The CVSS v3.1 base score is 4.3, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and impacting confidentiality only. The vulnerability does not allow code execution, integrity compromise, or availability disruption but can be used for reconnaissance to identify sensitive files or configuration data on the Jenkins controller. No patches or fixed versions are explicitly listed in the provided data, but affected users are advised to upgrade to versions that do not exhibit this behavior. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in the form of information disclosure. Attackers with read-level access to Jenkins can leverage this flaw to enumerate files on the Jenkins controller, potentially revealing sensitive configuration files, credentials, or other critical data stored on the server. This reconnaissance capability can facilitate further targeted attacks, privilege escalation, or lateral movement within the network. Organizations relying heavily on Jenkins for continuous integration and deployment, especially those managing sensitive or regulated data, may face increased risk of data leakage. While the vulnerability does not directly compromise system integrity or availability, the exposure of file existence information can weaken the overall security posture. The requirement for authenticated access limits exploitation to insiders or attackers who have already compromised low-level credentials, but the ease of exploitation (low complexity) and network accessibility make it a notable concern. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
To mitigate CVE-2025-58458, European organizations should: 1) Upgrade the Jenkins Git client Plugin to a version that is not vulnerable, specifically avoiding versions 6.3.2 and earlier except 6.1.4 and 6.2.1, once a fixed version is released by the Jenkins Project. 2) Restrict Jenkins access strictly to trusted users and enforce the principle of least privilege, ensuring that only necessary personnel have Overall or Read permissions. 3) Implement network segmentation and firewall rules to limit access to Jenkins controllers from untrusted networks. 4) Monitor Jenkins logs for unusual access patterns or repeated file existence checks that could indicate exploitation attempts. 5) Consider disabling or restricting the use of the amazon-s3 protocol in Git URLs if not required. 6) Regularly audit Jenkins plugin versions and configurations as part of vulnerability management. 7) Employ multi-factor authentication (MFA) for Jenkins user accounts to reduce the risk of credential compromise. These steps go beyond generic advice by focusing on access control hardening, monitoring, and configuration adjustments specific to the vulnerability's exploitation vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2025-09-02T12:44:16.983Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b85c1aad5a09ad00f77808
Added to database: 9/3/2025, 3:17:46 PM
Last enriched: 11/4/2025, 10:10:54 PM
Last updated: 12/3/2025, 3:26:54 PM
Views: 106
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-57200: n/a
HighCVE-2025-65267: n/a
HighCVE-2025-53841: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in Akamai Guardicore Platform Agent
HighCVE-2025-13949: Unrestricted Upload in ProudMuBai GoFilm
MediumCVE-2025-13948: Use of Hard-coded Cryptographic Key in opsre go-ldap-admin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.