CVE-2025-58459: Vulnerability in Jenkins Project Jenkins global-build-stats Plugin
Jenkins global-build-stats Plugin 322.v22f4db_18e2dd and earlier does not perform permission checks in its REST API endpoints, allowing attackers with Overall/Read permission to enumerate graph IDs.
AI Analysis
Technical Summary
CVE-2025-58459 identifies a security vulnerability in the Jenkins global-build-stats Plugin, specifically in versions 322.v22f4db_18e2dd and earlier. The core issue is the absence of proper permission checks on REST API endpoints within the plugin. Normally, Jenkins enforces strict permission controls to restrict access to sensitive data and operations. However, due to this flaw, any user with Overall/Read permissions—which are relatively common and less privileged—can enumerate graph IDs via the plugin’s API. Graph IDs represent identifiers for build statistics visualizations or data sets, which could reveal insights about the build environment, project activity, or system usage patterns. Although this vulnerability does not allow modification or deletion of data (no integrity or availability impact), the unauthorized disclosure of graph IDs constitutes an information disclosure risk (CWE-284: Improper Access Control). The vulnerability is remotely exploitable without user interaction and requires only low attack complexity. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact confined to confidentiality. No patches or exploits are currently documented, but the plugin’s widespread use in continuous integration/continuous deployment (CI/CD) pipelines makes this a relevant concern for organizations relying on Jenkins for software development and delivery.
Potential Impact
For European organizations, the primary impact of CVE-2025-58459 is the potential leakage of build-related metadata through unauthorized enumeration of graph IDs. This information could aid attackers in profiling development workflows, identifying active projects, or mapping the CI/CD environment, which may facilitate subsequent targeted attacks such as supply chain compromises or privilege escalation attempts. While the vulnerability does not directly compromise system integrity or availability, the exposure of internal build statistics could undermine operational security and confidentiality. Organizations in sectors with stringent compliance requirements (e.g., finance, healthcare, critical infrastructure) may face increased risk if sensitive project information is inadvertently disclosed. Additionally, attackers could combine this information with other vulnerabilities to escalate their access or conduct reconnaissance. The medium severity rating suggests a moderate risk level, but the ease of exploitation and common use of Jenkins in European enterprises elevate the importance of addressing this issue promptly.
Mitigation Recommendations
To mitigate CVE-2025-58459, European organizations should: 1) Immediately update the Jenkins global-build-stats Plugin to a version that includes proper permission checks once available from the vendor. 2) In the interim, restrict Overall/Read permissions to trusted users only, minimizing the number of accounts that can exploit this flaw. 3) Audit and monitor REST API access logs for unusual enumeration activity targeting graph IDs. 4) Implement network-level controls such as IP whitelisting or VPN access to limit exposure of Jenkins instances. 5) Review and tighten Jenkins role-based access control (RBAC) policies to ensure least privilege principles are enforced. 6) Consider disabling the global-build-stats Plugin if it is not essential to operations until a patch is released. 7) Educate development and security teams about this vulnerability to enhance detection and response capabilities. These steps go beyond generic advice by focusing on access restriction, monitoring, and temporary compensating controls tailored to the plugin’s specific weakness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-58459: Vulnerability in Jenkins Project Jenkins global-build-stats Plugin
Description
Jenkins global-build-stats Plugin 322.v22f4db_18e2dd and earlier does not perform permission checks in its REST API endpoints, allowing attackers with Overall/Read permission to enumerate graph IDs.
AI-Powered Analysis
Technical Analysis
CVE-2025-58459 identifies a security vulnerability in the Jenkins global-build-stats Plugin, specifically in versions 322.v22f4db_18e2dd and earlier. The core issue is the absence of proper permission checks on REST API endpoints within the plugin. Normally, Jenkins enforces strict permission controls to restrict access to sensitive data and operations. However, due to this flaw, any user with Overall/Read permissions—which are relatively common and less privileged—can enumerate graph IDs via the plugin’s API. Graph IDs represent identifiers for build statistics visualizations or data sets, which could reveal insights about the build environment, project activity, or system usage patterns. Although this vulnerability does not allow modification or deletion of data (no integrity or availability impact), the unauthorized disclosure of graph IDs constitutes an information disclosure risk (CWE-284: Improper Access Control). The vulnerability is remotely exploitable without user interaction and requires only low attack complexity. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact confined to confidentiality. No patches or exploits are currently documented, but the plugin’s widespread use in continuous integration/continuous deployment (CI/CD) pipelines makes this a relevant concern for organizations relying on Jenkins for software development and delivery.
Potential Impact
For European organizations, the primary impact of CVE-2025-58459 is the potential leakage of build-related metadata through unauthorized enumeration of graph IDs. This information could aid attackers in profiling development workflows, identifying active projects, or mapping the CI/CD environment, which may facilitate subsequent targeted attacks such as supply chain compromises or privilege escalation attempts. While the vulnerability does not directly compromise system integrity or availability, the exposure of internal build statistics could undermine operational security and confidentiality. Organizations in sectors with stringent compliance requirements (e.g., finance, healthcare, critical infrastructure) may face increased risk if sensitive project information is inadvertently disclosed. Additionally, attackers could combine this information with other vulnerabilities to escalate their access or conduct reconnaissance. The medium severity rating suggests a moderate risk level, but the ease of exploitation and common use of Jenkins in European enterprises elevate the importance of addressing this issue promptly.
Mitigation Recommendations
To mitigate CVE-2025-58459, European organizations should: 1) Immediately update the Jenkins global-build-stats Plugin to a version that includes proper permission checks once available from the vendor. 2) In the interim, restrict Overall/Read permissions to trusted users only, minimizing the number of accounts that can exploit this flaw. 3) Audit and monitor REST API access logs for unusual enumeration activity targeting graph IDs. 4) Implement network-level controls such as IP whitelisting or VPN access to limit exposure of Jenkins instances. 5) Review and tighten Jenkins role-based access control (RBAC) policies to ensure least privilege principles are enforced. 6) Consider disabling the global-build-stats Plugin if it is not essential to operations until a patch is released. 7) Educate development and security teams about this vulnerability to enhance detection and response capabilities. These steps go beyond generic advice by focusing on access restriction, monitoring, and temporary compensating controls tailored to the plugin’s specific weakness.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2025-09-02T12:44:16.983Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b85c1aad5a09ad00f7780b
Added to database: 9/3/2025, 3:17:46 PM
Last enriched: 11/4/2025, 10:11:07 PM
Last updated: 1/18/2026, 7:37:03 PM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1126: Unrestricted Upload in lwj flow
MediumCVE-2026-1125: Command Injection in D-Link DIR-823X
MediumCVE-2026-1124: SQL Injection in Yonyou KSOA
MediumCVE-2026-0863: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
HighCVE-2026-1123: SQL Injection in Yonyou KSOA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.