Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64146: Vulnerability in Jenkins Project Jenkins Curseforge Publisher Plugin

0
Medium
VulnerabilityCVE-2025-64146cvecve-2025-64146
Published: Wed Oct 29 2025 (10/29/2025, 13:29:49 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins Project
Product: Jenkins Curseforge Publisher Plugin

Description

Jenkins Curseforge Publisher Plugin 1.0 stores API Keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission, or access to the Jenkins controller file system.

AI-Powered Analysis

AILast updated: 11/05/2025, 15:55:47 UTC

Technical Analysis

CVE-2025-64146 identifies a vulnerability in the Jenkins Curseforge Publisher Plugin, specifically version 1.0, where API keys are stored unencrypted within the job configuration files (config.xml) on the Jenkins controller. These files are accessible to users who have Item/Extended Read permissions within Jenkins or to anyone with access to the Jenkins controller's underlying file system. The vulnerability is categorized under CWE-311, indicating the failure to protect sensitive data in storage. The exposure of API keys can lead to unauthorized access to Curseforge services, potentially allowing attackers to manipulate plugin publishing processes or escalate privileges within the Jenkins environment. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality only (C:L), with no impact on integrity or availability. The vulnerability does not have a patch released at the time of publication, and no known exploits are reported in the wild. The plugin's affected version is listed as '0', which likely indicates the initial release or all versions up to a certain point. The Jenkins controller is a critical component in CI/CD pipelines, and exposure of credentials here can have cascading effects on build and deployment security. The vulnerability highlights the importance of secure credential storage and access control within Jenkins plugins.

Potential Impact

For European organizations, this vulnerability poses a risk of credential leakage within Jenkins CI/CD environments, which are widely used across industries including finance, manufacturing, and technology sectors. Exposure of API keys can lead to unauthorized access to Curseforge services, potentially allowing attackers to manipulate plugin publishing workflows or gain footholds in the build infrastructure. This can result in supply chain compromise, unauthorized code deployment, or lateral movement within internal networks. Although the vulnerability does not directly impact system integrity or availability, the confidentiality breach can undermine trust in automated build processes and lead to indirect operational disruptions. Organizations with multi-tenant Jenkins environments or those granting extended read permissions broadly are particularly vulnerable. Given the reliance on Jenkins for software delivery, exploitation could affect software quality and release timelines, impacting business continuity and compliance with data protection regulations such as GDPR if sensitive data is indirectly exposed.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit and restrict Jenkins permissions, ensuring that only trusted users have Item/Extended Read access. Limit file system access to the Jenkins controller to authorized personnel only, employing strict OS-level access controls and monitoring. Consider encrypting or obfuscating API keys stored in config.xml files where possible, or migrating to credential management plugins that securely store secrets outside of job configuration files. Regularly review and rotate API keys associated with the Curseforge Publisher Plugin to minimize exposure risks. Monitor Jenkins logs and access patterns for unusual activity indicative of credential misuse. Until an official patch is released, avoid using the vulnerable plugin version or disable the plugin if not essential. Implement network segmentation to isolate Jenkins controllers from broader enterprise networks to reduce lateral movement potential. Finally, educate DevOps teams on secure credential handling and enforce policies that prevent storing sensitive data in plaintext within configuration files.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2025-10-28T07:34:37.542Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69021a8714cc779bff05107b

Added to database: 10/29/2025, 1:45:43 PM

Last enriched: 11/5/2025, 3:55:47 PM

Last updated: 12/14/2025, 2:24:23 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats