CVE-2025-58459: Vulnerability in Jenkins Project Jenkins global-build-stats Plugin
Jenkins global-build-stats Plugin 322.v22f4db_18e2dd and earlier does not perform permission checks in its REST API endpoints, allowing attackers with Overall/Read permission to enumerate graph IDs.
AI Analysis
Technical Summary
CVE-2025-58459 is a security vulnerability identified in the Jenkins global-build-stats Plugin, specifically versions 322.v22f4db_18e2dd and earlier. The vulnerability arises because the plugin's REST API endpoints do not enforce proper permission checks. This flaw allows attackers who have Overall/Read permission on the Jenkins instance to enumerate graph IDs through the REST API. Essentially, while the attacker must have some level of access (Overall/Read permission), the lack of granular permission enforcement on these endpoints means they can extract potentially sensitive metadata about build statistics graphs that should otherwise be restricted. This information disclosure could aid attackers in reconnaissance activities, allowing them to map out build statistics and potentially infer details about the build environment, project activity, or pipeline configurations. The vulnerability does not require elevated privileges beyond Overall/Read, which is a relatively low-level permission in Jenkins, often granted to many users or automated systems. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The absence of patch links suggests that a fix may not have been released at the time of this report, or it is pending. Given Jenkins' widespread use in continuous integration/continuous deployment (CI/CD) pipelines, this vulnerability could be leveraged as part of a broader attack chain targeting software supply chains or internal development processes.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those heavily reliant on Jenkins for their software development lifecycle. Unauthorized enumeration of graph IDs could lead to information leakage about build processes, which attackers might use to identify high-value targets or weak points in the CI/CD pipeline. This could facilitate further attacks such as supply chain compromises, insertion of malicious code, or disruption of build processes. Confidentiality is primarily affected, as sensitive metadata about build statistics and potentially project details can be exposed. While the vulnerability does not directly allow code execution or modification, the information gained can be leveraged for more sophisticated attacks. Organizations in sectors with stringent regulatory requirements (e.g., finance, healthcare, critical infrastructure) may face compliance risks if such information disclosure leads to broader security incidents. The ease of exploitation is moderate since the attacker needs Overall/Read permission, which might be granted to internal users or third-party integrations, making insider threats or compromised accounts a realistic vector. Availability and integrity impacts are limited in this vulnerability alone but could be part of a larger attack sequence.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify and restrict the assignment of Overall/Read permissions in Jenkins to only trusted users and systems, minimizing the attack surface. Implement strict access control policies and regularly audit user permissions to ensure least privilege principles are enforced. Organizations should monitor Jenkins logs for unusual API access patterns that could indicate enumeration attempts. Until a patch is available, consider disabling or restricting access to the global-build-stats plugin REST API endpoints if feasible, or isolate Jenkins instances from untrusted networks. Employ network segmentation and firewall rules to limit access to Jenkins servers. Additionally, keep Jenkins and all plugins up to date, and subscribe to Jenkins security advisories to apply patches promptly once released. Implement multi-factor authentication (MFA) for Jenkins access to reduce the risk of compromised credentials being used to exploit this vulnerability. Finally, integrate Jenkins security monitoring into the organization's broader security information and event management (SIEM) systems for real-time alerting.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-58459: Vulnerability in Jenkins Project Jenkins global-build-stats Plugin
Description
Jenkins global-build-stats Plugin 322.v22f4db_18e2dd and earlier does not perform permission checks in its REST API endpoints, allowing attackers with Overall/Read permission to enumerate graph IDs.
AI-Powered Analysis
Technical Analysis
CVE-2025-58459 is a security vulnerability identified in the Jenkins global-build-stats Plugin, specifically versions 322.v22f4db_18e2dd and earlier. The vulnerability arises because the plugin's REST API endpoints do not enforce proper permission checks. This flaw allows attackers who have Overall/Read permission on the Jenkins instance to enumerate graph IDs through the REST API. Essentially, while the attacker must have some level of access (Overall/Read permission), the lack of granular permission enforcement on these endpoints means they can extract potentially sensitive metadata about build statistics graphs that should otherwise be restricted. This information disclosure could aid attackers in reconnaissance activities, allowing them to map out build statistics and potentially infer details about the build environment, project activity, or pipeline configurations. The vulnerability does not require elevated privileges beyond Overall/Read, which is a relatively low-level permission in Jenkins, often granted to many users or automated systems. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The absence of patch links suggests that a fix may not have been released at the time of this report, or it is pending. Given Jenkins' widespread use in continuous integration/continuous deployment (CI/CD) pipelines, this vulnerability could be leveraged as part of a broader attack chain targeting software supply chains or internal development processes.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those heavily reliant on Jenkins for their software development lifecycle. Unauthorized enumeration of graph IDs could lead to information leakage about build processes, which attackers might use to identify high-value targets or weak points in the CI/CD pipeline. This could facilitate further attacks such as supply chain compromises, insertion of malicious code, or disruption of build processes. Confidentiality is primarily affected, as sensitive metadata about build statistics and potentially project details can be exposed. While the vulnerability does not directly allow code execution or modification, the information gained can be leveraged for more sophisticated attacks. Organizations in sectors with stringent regulatory requirements (e.g., finance, healthcare, critical infrastructure) may face compliance risks if such information disclosure leads to broader security incidents. The ease of exploitation is moderate since the attacker needs Overall/Read permission, which might be granted to internal users or third-party integrations, making insider threats or compromised accounts a realistic vector. Availability and integrity impacts are limited in this vulnerability alone but could be part of a larger attack sequence.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify and restrict the assignment of Overall/Read permissions in Jenkins to only trusted users and systems, minimizing the attack surface. Implement strict access control policies and regularly audit user permissions to ensure least privilege principles are enforced. Organizations should monitor Jenkins logs for unusual API access patterns that could indicate enumeration attempts. Until a patch is available, consider disabling or restricting access to the global-build-stats plugin REST API endpoints if feasible, or isolate Jenkins instances from untrusted networks. Employ network segmentation and firewall rules to limit access to Jenkins servers. Additionally, keep Jenkins and all plugins up to date, and subscribe to Jenkins security advisories to apply patches promptly once released. Implement multi-factor authentication (MFA) for Jenkins access to reduce the risk of compromised credentials being used to exploit this vulnerability. Finally, integrate Jenkins security monitoring into the organization's broader security information and event management (SIEM) systems for real-time alerting.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2025-09-02T12:44:16.983Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b85c1aad5a09ad00f7780b
Added to database: 9/3/2025, 3:17:46 PM
Last enriched: 9/3/2025, 3:33:00 PM
Last updated: 9/4/2025, 1:49:45 PM
Views: 9
Related Threats
CVE-2025-9636: Vulnerability in pgadmin.org pgAdmin 4
HighCVE-2025-23262: CWE-863 Incorrect Authorization in NVIDIA ConnectX GA
MediumCVE-2025-23261: CWE-532 Insertion of Sensitive Information into Log File in NVIDIA NVOS
MediumCVE-2025-57576: n/a
HighCVE-2025-23302: CWE-1244 Internal Asset Exposed to Unsafe Debug Access Level or State in NVIDIA HGX, DGX Hopper
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.