CVE-2025-64146: Vulnerability in Jenkins Project Jenkins Curseforge Publisher Plugin
Jenkins Curseforge Publisher Plugin 1.0 stores API Keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission, or access to the Jenkins controller file system.
AI Analysis
Technical Summary
CVE-2025-64146 identifies a vulnerability in the Jenkins Curseforge Publisher Plugin, specifically version 1.0, where API keys are stored unencrypted within the job configuration files (config.xml) on the Jenkins controller. These files are accessible to users who have Item/Extended Read permissions within Jenkins or to anyone with access to the Jenkins controller's underlying file system. The vulnerability is categorized under CWE-311, indicating the failure to protect sensitive data in storage. The exposure of API keys can lead to unauthorized access to Curseforge services, potentially allowing attackers to manipulate plugin publishing processes or escalate privileges within the Jenkins environment. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality only (C:L), with no impact on integrity or availability. The vulnerability does not have a patch released at the time of publication, and no known exploits are reported in the wild. The plugin's affected version is listed as '0', which likely indicates the initial release or all versions up to a certain point. The Jenkins controller is a critical component in CI/CD pipelines, and exposure of credentials here can have cascading effects on build and deployment security. The vulnerability highlights the importance of secure credential storage and access control within Jenkins plugins.
Potential Impact
For European organizations, this vulnerability poses a risk of credential leakage within Jenkins CI/CD environments, which are widely used across industries including finance, manufacturing, and technology sectors. Exposure of API keys can lead to unauthorized access to Curseforge services, potentially allowing attackers to manipulate plugin publishing workflows or gain footholds in the build infrastructure. This can result in supply chain compromise, unauthorized code deployment, or lateral movement within internal networks. Although the vulnerability does not directly impact system integrity or availability, the confidentiality breach can undermine trust in automated build processes and lead to indirect operational disruptions. Organizations with multi-tenant Jenkins environments or those granting extended read permissions broadly are particularly vulnerable. Given the reliance on Jenkins for software delivery, exploitation could affect software quality and release timelines, impacting business continuity and compliance with data protection regulations such as GDPR if sensitive data is indirectly exposed.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit and restrict Jenkins permissions, ensuring that only trusted users have Item/Extended Read access. Limit file system access to the Jenkins controller to authorized personnel only, employing strict OS-level access controls and monitoring. Consider encrypting or obfuscating API keys stored in config.xml files where possible, or migrating to credential management plugins that securely store secrets outside of job configuration files. Regularly review and rotate API keys associated with the Curseforge Publisher Plugin to minimize exposure risks. Monitor Jenkins logs and access patterns for unusual activity indicative of credential misuse. Until an official patch is released, avoid using the vulnerable plugin version or disable the plugin if not essential. Implement network segmentation to isolate Jenkins controllers from broader enterprise networks to reduce lateral movement potential. Finally, educate DevOps teams on secure credential handling and enforce policies that prevent storing sensitive data in plaintext within configuration files.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Poland, Italy
CVE-2025-64146: Vulnerability in Jenkins Project Jenkins Curseforge Publisher Plugin
Description
Jenkins Curseforge Publisher Plugin 1.0 stores API Keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission, or access to the Jenkins controller file system.
AI-Powered Analysis
Technical Analysis
CVE-2025-64146 identifies a vulnerability in the Jenkins Curseforge Publisher Plugin, specifically version 1.0, where API keys are stored unencrypted within the job configuration files (config.xml) on the Jenkins controller. These files are accessible to users who have Item/Extended Read permissions within Jenkins or to anyone with access to the Jenkins controller's underlying file system. The vulnerability is categorized under CWE-311, indicating the failure to protect sensitive data in storage. The exposure of API keys can lead to unauthorized access to Curseforge services, potentially allowing attackers to manipulate plugin publishing processes or escalate privileges within the Jenkins environment. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality only (C:L), with no impact on integrity or availability. The vulnerability does not have a patch released at the time of publication, and no known exploits are reported in the wild. The plugin's affected version is listed as '0', which likely indicates the initial release or all versions up to a certain point. The Jenkins controller is a critical component in CI/CD pipelines, and exposure of credentials here can have cascading effects on build and deployment security. The vulnerability highlights the importance of secure credential storage and access control within Jenkins plugins.
Potential Impact
For European organizations, this vulnerability poses a risk of credential leakage within Jenkins CI/CD environments, which are widely used across industries including finance, manufacturing, and technology sectors. Exposure of API keys can lead to unauthorized access to Curseforge services, potentially allowing attackers to manipulate plugin publishing workflows or gain footholds in the build infrastructure. This can result in supply chain compromise, unauthorized code deployment, or lateral movement within internal networks. Although the vulnerability does not directly impact system integrity or availability, the confidentiality breach can undermine trust in automated build processes and lead to indirect operational disruptions. Organizations with multi-tenant Jenkins environments or those granting extended read permissions broadly are particularly vulnerable. Given the reliance on Jenkins for software delivery, exploitation could affect software quality and release timelines, impacting business continuity and compliance with data protection regulations such as GDPR if sensitive data is indirectly exposed.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit and restrict Jenkins permissions, ensuring that only trusted users have Item/Extended Read access. Limit file system access to the Jenkins controller to authorized personnel only, employing strict OS-level access controls and monitoring. Consider encrypting or obfuscating API keys stored in config.xml files where possible, or migrating to credential management plugins that securely store secrets outside of job configuration files. Regularly review and rotate API keys associated with the Curseforge Publisher Plugin to minimize exposure risks. Monitor Jenkins logs and access patterns for unusual activity indicative of credential misuse. Until an official patch is released, avoid using the vulnerable plugin version or disable the plugin if not essential. Implement network segmentation to isolate Jenkins controllers from broader enterprise networks to reduce lateral movement potential. Finally, educate DevOps teams on secure credential handling and enforce policies that prevent storing sensitive data in plaintext within configuration files.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2025-10-28T07:34:37.542Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69021a8714cc779bff05107b
Added to database: 10/29/2025, 1:45:43 PM
Last enriched: 11/5/2025, 3:55:47 PM
Last updated: 12/14/2025, 2:24:23 AM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14640: SQL Injection in code-projects Student File Management System
MediumCVE-2025-14639: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-14638: SQL Injection in itsourcecode Online Pet Shop Management System
MediumCVE-2025-13832
UnknownCVE-2025-14637: SQL Injection in itsourcecode Online Pet Shop Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.