Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59475: Vulnerability in Jenkins Project Jenkins

0
Medium
VulnerabilityCVE-2025-59475cvecve-2025-59475
Published: Wed Sep 17 2025 (09/17/2025, 13:17:47 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins Project
Product: Jenkins

Description

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check for the authenticated user profile dropdown menu, allowing attackers without Overall/Read permission to obtain limited information about the Jenkins configuration by listing available options in this menu (e.g., whether Credentials Plugin is installed).

AI-Powered Analysis

AILast updated: 09/26/2025, 00:21:06 UTC

Technical Analysis

CVE-2025-59475 is a medium-severity vulnerability affecting Jenkins versions 2.527 and earlier, including LTS 2.516.2 and earlier. The flaw arises because Jenkins does not perform a proper permission check on the authenticated user profile dropdown menu. Specifically, users who are authenticated but lack the Overall/Read permission can still access this dropdown menu and enumerate limited information about the Jenkins configuration. This includes details such as whether certain plugins, like the Credentials Plugin, are installed. The vulnerability is classified under CWE-862 (Missing Authorization) and has a CVSS 3.1 base score of 4.3, indicating a low to medium impact primarily on confidentiality. The attack vector is network-based, requiring low attack complexity and only limited privileges (authenticated user), with no user interaction needed. The vulnerability does not affect integrity or availability, and no known exploits are currently in the wild. However, the information disclosure could aid attackers in further reconnaissance and targeted attacks by revealing configuration details that might expose additional attack surfaces or weaknesses.

Potential Impact

For European organizations using Jenkins for continuous integration and deployment pipelines, this vulnerability could lead to unauthorized disclosure of sensitive configuration information. Although the information disclosed is limited, knowledge about installed plugins like the Credentials Plugin can help attackers tailor subsequent attacks, potentially targeting credential storage or other sensitive components. This could increase the risk of privilege escalation or lateral movement within the network. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, critical infrastructure) may face increased risk if attackers leverage this information to compromise build environments or inject malicious code into software delivery pipelines. While the direct impact on confidentiality is limited, the vulnerability lowers the barrier for attackers to gather intelligence, which can be a stepping stone to more severe breaches.

Mitigation Recommendations

European organizations should promptly upgrade Jenkins installations to versions later than 2.527 (or LTS versions later than 2.516.2) where this vulnerability is addressed. In the absence of an official patch, administrators should restrict access to Jenkins to trusted users only and enforce the principle of least privilege, ensuring that users without Overall/Read permission cannot authenticate or access the system. Additionally, organizations should audit user permissions regularly and monitor Jenkins logs for unusual access patterns. Network-level controls such as IP whitelisting or VPN access can further reduce exposure. Implementing multi-factor authentication (MFA) for Jenkins access can also mitigate risks from compromised credentials. Finally, organizations should review installed plugins and disable or remove unnecessary ones, especially those related to credentials management, to reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2025-09-16T16:16:05.525Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68cab73ba2484644446021a8

Added to database: 9/17/2025, 1:27:23 PM

Last enriched: 9/26/2025, 12:21:06 AM

Last updated: 11/3/2025, 5:58:33 AM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats