Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58459: Vulnerability in Jenkins Project Jenkins global-build-stats Plugin

0
Medium
VulnerabilityCVE-2025-58459cvecve-2025-58459
Published: Wed Sep 03 2025 (09/03/2025, 15:02:26 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins Project
Product: Jenkins global-build-stats Plugin

Description

Jenkins global-build-stats Plugin 322.v22f4db_18e2dd and earlier does not perform permission checks in its REST API endpoints, allowing attackers with Overall/Read permission to enumerate graph IDs.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:11:07 UTC

Technical Analysis

CVE-2025-58459 identifies a security vulnerability in the Jenkins global-build-stats Plugin, specifically in versions 322.v22f4db_18e2dd and earlier. The core issue is the absence of proper permission checks on REST API endpoints within the plugin. Normally, Jenkins enforces strict permission controls to restrict access to sensitive data and operations. However, due to this flaw, any user with Overall/Read permissions—which are relatively common and less privileged—can enumerate graph IDs via the plugin’s API. Graph IDs represent identifiers for build statistics visualizations or data sets, which could reveal insights about the build environment, project activity, or system usage patterns. Although this vulnerability does not allow modification or deletion of data (no integrity or availability impact), the unauthorized disclosure of graph IDs constitutes an information disclosure risk (CWE-284: Improper Access Control). The vulnerability is remotely exploitable without user interaction and requires only low attack complexity. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact confined to confidentiality. No patches or exploits are currently documented, but the plugin’s widespread use in continuous integration/continuous deployment (CI/CD) pipelines makes this a relevant concern for organizations relying on Jenkins for software development and delivery.

Potential Impact

For European organizations, the primary impact of CVE-2025-58459 is the potential leakage of build-related metadata through unauthorized enumeration of graph IDs. This information could aid attackers in profiling development workflows, identifying active projects, or mapping the CI/CD environment, which may facilitate subsequent targeted attacks such as supply chain compromises or privilege escalation attempts. While the vulnerability does not directly compromise system integrity or availability, the exposure of internal build statistics could undermine operational security and confidentiality. Organizations in sectors with stringent compliance requirements (e.g., finance, healthcare, critical infrastructure) may face increased risk if sensitive project information is inadvertently disclosed. Additionally, attackers could combine this information with other vulnerabilities to escalate their access or conduct reconnaissance. The medium severity rating suggests a moderate risk level, but the ease of exploitation and common use of Jenkins in European enterprises elevate the importance of addressing this issue promptly.

Mitigation Recommendations

To mitigate CVE-2025-58459, European organizations should: 1) Immediately update the Jenkins global-build-stats Plugin to a version that includes proper permission checks once available from the vendor. 2) In the interim, restrict Overall/Read permissions to trusted users only, minimizing the number of accounts that can exploit this flaw. 3) Audit and monitor REST API access logs for unusual enumeration activity targeting graph IDs. 4) Implement network-level controls such as IP whitelisting or VPN access to limit exposure of Jenkins instances. 5) Review and tighten Jenkins role-based access control (RBAC) policies to ensure least privilege principles are enforced. 6) Consider disabling the global-build-stats Plugin if it is not essential to operations until a patch is released. 7) Educate development and security teams about this vulnerability to enhance detection and response capabilities. These steps go beyond generic advice by focusing on access restriction, monitoring, and temporary compensating controls tailored to the plugin’s specific weakness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2025-09-02T12:44:16.983Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b85c1aad5a09ad00f7780b

Added to database: 9/3/2025, 3:17:46 PM

Last enriched: 11/4/2025, 10:11:07 PM

Last updated: 12/1/2025, 11:28:05 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats