Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58458: Vulnerability in Jenkins Project Jenkins Git client Plugin

0
Medium
VulnerabilityCVE-2025-58458cvecve-2025-58458
Published: Wed Sep 03 2025 (09/03/2025, 15:02:26 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins Project
Product: Jenkins Git client Plugin

Description

In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:10:54 UTC

Technical Analysis

CVE-2025-58458 is a vulnerability identified in the Jenkins Git client Plugin, specifically affecting versions 6.3.2 and earlier except for 6.1.4 and 6.2.1. The flaw is rooted in the Git URL field form validation logic when the amazon-s3 protocol is specified for use with JGit. The validation responses differ depending on whether a specified file path exists on the Jenkins controller's filesystem. This difference allows an attacker who has Overall or Read permission on the Jenkins instance to perform a file existence check on arbitrary paths on the controller. The vulnerability is classified under CWE-538 (File and Directory Information Exposure) and CWE-200 (Information Exposure). The CVSS v3.1 base score is 4.3, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges (PR:L), no user interaction, and impacting confidentiality only. The vulnerability does not allow code execution, integrity compromise, or availability disruption but can be used for reconnaissance to identify sensitive files or configuration data on the Jenkins controller. No patches or fixed versions are explicitly listed in the provided data, but affected users are advised to upgrade to versions that do not exhibit this behavior. No known exploits have been reported in the wild as of the publication date.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in the form of information disclosure. Attackers with read-level access to Jenkins can leverage this flaw to enumerate files on the Jenkins controller, potentially revealing sensitive configuration files, credentials, or other critical data stored on the server. This reconnaissance capability can facilitate further targeted attacks, privilege escalation, or lateral movement within the network. Organizations relying heavily on Jenkins for continuous integration and deployment, especially those managing sensitive or regulated data, may face increased risk of data leakage. While the vulnerability does not directly compromise system integrity or availability, the exposure of file existence information can weaken the overall security posture. The requirement for authenticated access limits exploitation to insiders or attackers who have already compromised low-level credentials, but the ease of exploitation (low complexity) and network accessibility make it a notable concern. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

To mitigate CVE-2025-58458, European organizations should: 1) Upgrade the Jenkins Git client Plugin to a version that is not vulnerable, specifically avoiding versions 6.3.2 and earlier except 6.1.4 and 6.2.1, once a fixed version is released by the Jenkins Project. 2) Restrict Jenkins access strictly to trusted users and enforce the principle of least privilege, ensuring that only necessary personnel have Overall or Read permissions. 3) Implement network segmentation and firewall rules to limit access to Jenkins controllers from untrusted networks. 4) Monitor Jenkins logs for unusual access patterns or repeated file existence checks that could indicate exploitation attempts. 5) Consider disabling or restricting the use of the amazon-s3 protocol in Git URLs if not required. 6) Regularly audit Jenkins plugin versions and configurations as part of vulnerability management. 7) Employ multi-factor authentication (MFA) for Jenkins user accounts to reduce the risk of credential compromise. These steps go beyond generic advice by focusing on access control hardening, monitoring, and configuration adjustments specific to the vulnerability's exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2025-09-02T12:44:16.983Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b85c1aad5a09ad00f77808

Added to database: 9/3/2025, 3:17:46 PM

Last enriched: 11/4/2025, 10:10:54 PM

Last updated: 12/3/2025, 3:26:54 PM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats