Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64140: Vulnerability in Jenkins Project Jenkins Azure CLI Plugin

0
High
VulnerabilityCVE-2025-64140cvecve-2025-64140
Published: Wed Oct 29 2025 (10/29/2025, 13:29:45 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins Project
Product: Jenkins Azure CLI Plugin

Description

Jenkins Azure CLI Plugin 0.9 and earlier does not restrict which commands it executes on the Jenkins controller, allowing attackers with Item/Configure permission to execute arbitrary shell commands.

AI-Powered Analysis

AILast updated: 11/05/2025, 15:54:12 UTC

Technical Analysis

CVE-2025-64140 is a command injection vulnerability found in the Jenkins Azure CLI Plugin version 0.9 and earlier. The plugin fails to properly restrict which shell commands it executes on the Jenkins controller, allowing an attacker who has Item/Configure permission within Jenkins to execute arbitrary shell commands remotely. This vulnerability arises from improper input validation and command execution controls (classified under CWE-78: Improper Neutralization of Special Elements used in an OS Command). The Jenkins controller typically has high privileges and access to critical build and deployment infrastructure, so exploitation can lead to full system compromise, including data theft, service disruption, or lateral movement within the network. The vulnerability is remotely exploitable over the network without user interaction but requires the attacker to have some level of authenticated access (Item/Configure permission). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. No patches or exploits are currently publicly available, but the vulnerability is publicly disclosed and should be treated with urgency. Organizations using Jenkins with this plugin should audit permissions and prepare to update once a fix is released.

Potential Impact

For European organizations, this vulnerability poses a significant risk to software development and deployment pipelines that rely on Jenkins with the Azure CLI Plugin. Successful exploitation can lead to unauthorized command execution on the Jenkins controller, potentially resulting in theft or manipulation of source code, injection of malicious code into builds, disruption of CI/CD workflows, and compromise of connected infrastructure. This can cause operational downtime, intellectual property loss, and reputational damage. Given the critical role of Jenkins in automating deployments, the impact extends beyond the Jenkins server to downstream production environments. Organizations in sectors such as finance, telecommunications, and critical infrastructure, which heavily rely on automated DevOps processes, are particularly vulnerable. The requirement for Item/Configure permission means insider threats or compromised developer accounts could be leveraged to exploit this vulnerability.

Mitigation Recommendations

Immediate mitigation steps include auditing and restricting Jenkins permissions to limit Item/Configure access only to trusted administrators. Implement strict access controls and monitor for unusual configuration changes or command executions within Jenkins. Disable or remove the Azure CLI Plugin if it is not essential. Network segmentation should isolate the Jenkins controller from sensitive production systems. Employ Jenkins security best practices such as enabling Role-Based Access Control (RBAC) and using credential vaults. Since no patch is currently available, organizations should track Jenkins security advisories closely and apply updates promptly once a fix is released. Additionally, consider implementing runtime monitoring and anomaly detection on the Jenkins controller to detect potential exploitation attempts. Regularly back up Jenkins configurations and jobs to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2025-10-28T07:34:37.542Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69021a8414cc779bff050feb

Added to database: 10/29/2025, 1:45:40 PM

Last enriched: 11/5/2025, 3:54:12 PM

Last updated: 12/14/2025, 9:01:02 AM

Views: 120

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats