Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59475: Vulnerability in Jenkins Project Jenkins

0
Medium
VulnerabilityCVE-2025-59475cvecve-2025-59475
Published: Wed Sep 17 2025 (09/17/2025, 13:17:47 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins Project
Product: Jenkins

Description

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check for the authenticated user profile dropdown menu, allowing attackers without Overall/Read permission to obtain limited information about the Jenkins configuration by listing available options in this menu (e.g., whether Credentials Plugin is installed).

AI-Powered Analysis

AILast updated: 11/04/2025, 22:13:08 UTC

Technical Analysis

CVE-2025-59475 is a vulnerability identified in Jenkins, a widely used open-source automation server for continuous integration and delivery. The issue affects Jenkins versions 2.527 and earlier, including the Long-Term Support (LTS) version 2.516.2 and earlier. The root cause is a missing permission check on the authenticated user profile dropdown menu. Normally, Jenkins enforces permission checks to restrict access to configuration details based on user roles and privileges. However, this vulnerability allows any authenticated user—even those lacking the Overall/Read permission—to access the dropdown menu and enumerate certain configuration options. This includes discovering whether sensitive plugins, such as the Credentials Plugin, are installed. While the vulnerability does not permit modification of configurations or disruption of service, it leaks information that could be leveraged by attackers to plan more targeted attacks, such as privilege escalation or credential theft. The CVSS v3.1 base score is 4.3, reflecting a medium severity due to the limited confidentiality impact and the requirement for authentication. No user interaction is needed beyond login, and the attack vector is network-based. There are no known public exploits or active exploitation campaigns reported at this time. The vulnerability is classified under CWE-862 (Missing Authorization). No official patches or fixes are linked yet, so mitigation currently relies on access control adjustments and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-59475 primarily involves information disclosure risks within Jenkins environments. Since Jenkins is commonly used in software development and DevOps workflows, leaking configuration details such as installed plugins can provide attackers with valuable intelligence to craft subsequent attacks, including privilege escalation or exploitation of other plugin vulnerabilities. Although the vulnerability does not directly compromise system integrity or availability, the exposure of configuration data can weaken the overall security posture. Organizations with large development teams or those that allow broad authenticated access to Jenkins without strict role-based controls are at higher risk. This could lead to targeted attacks on critical infrastructure or intellectual property. Additionally, regulatory frameworks like GDPR require safeguarding of IT systems; information leakage could be viewed as a compliance risk if it leads to further breaches. The medium severity rating suggests that while immediate damage is limited, the vulnerability should not be ignored, especially in environments with sensitive or critical build pipelines.

Mitigation Recommendations

To mitigate CVE-2025-59475, European organizations should implement the following specific measures: 1) Upgrade Jenkins to a version beyond 2.527 or LTS 2.516.2 once a patch is released to address the permission check flaw. 2) Until patches are available, restrict authenticated user access to Jenkins by enforcing strict role-based access control (RBAC), ensuring only trusted users have login permissions. 3) Review and tighten permissions related to the Overall/Read role, minimizing the number of users with elevated privileges. 4) Disable or restrict access to the user profile dropdown menu via custom security configurations or plugins if possible. 5) Monitor Jenkins logs for unusual access patterns or attempts to enumerate configuration options. 6) Conduct internal audits of Jenkins plugin installations and configurations to identify and secure sensitive components like the Credentials Plugin. 7) Educate development and operations teams about the risks of information disclosure and enforce best practices for credential management. 8) Consider network segmentation to isolate Jenkins servers from broader internal networks, limiting exposure. These targeted actions go beyond generic advice by focusing on access control hardening and monitoring specific to this vulnerability's exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2025-09-16T16:16:05.525Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68cab73ba2484644446021a8

Added to database: 9/17/2025, 1:27:23 PM

Last enriched: 11/4/2025, 10:13:08 PM

Last updated: 12/17/2025, 7:06:12 PM

Views: 218

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats