CVE-2025-67635: Vulnerability in Jenkins Project Jenkins
Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not properly close HTTP-based CLI connections when the connection stream becomes corrupted, allowing unauthenticated attackers to cause a denial of service.
AI Analysis
Technical Summary
CVE-2025-67635 is a vulnerability identified in Jenkins, a widely used open-source automation server that facilitates continuous integration and continuous delivery (CI/CD). The flaw exists in Jenkins versions 2.540 and earlier, including the Long-Term Support (LTS) release 2.528.2 and earlier. The issue arises because Jenkins does not properly close HTTP-based Command Line Interface (CLI) connections when the connection stream becomes corrupted. This improper handling leads to resource exhaustion or hanging connections, which an unauthenticated attacker can exploit remotely to cause a denial of service (DoS) condition. The vulnerability is classified under CWE-404 (Improper Resource Shutdown or Release), indicating that the system fails to release resources correctly, leading to potential service disruption. The CVSS v3.1 base score is 7.5 (high severity), reflecting the network attack vector, no required privileges, no user interaction, and a high impact on availability, while confidentiality and integrity remain unaffected. No known exploits have been reported in the wild, and no official patches have been linked at the time of publication. The vulnerability affects Jenkins instances exposed to untrusted networks, especially those that allow HTTP-based CLI access without adequate network segmentation or access controls. Attackers can repeatedly send malformed or corrupted CLI connection streams, causing Jenkins to maintain open connections and eventually exhaust system resources, leading to service unavailability. This can disrupt automated build and deployment pipelines, impacting development velocity and operational continuity.
Potential Impact
For European organizations, the primary impact of CVE-2025-67635 is denial of service against Jenkins servers, which are critical components in modern software development and deployment workflows. Disruption of Jenkins services can halt CI/CD pipelines, delaying software releases, updates, and security patches, thereby increasing operational risk. Organizations relying on Jenkins for infrastructure automation, testing, or deployment may experience significant downtime, affecting business continuity and potentially causing financial losses. In sectors such as finance, telecommunications, manufacturing, and public services, where automation and rapid deployment are essential, this vulnerability could lead to cascading operational disruptions. Additionally, prolonged outages may increase the attack surface by forcing organizations to revert to manual processes or less secure alternatives. Since the vulnerability requires no authentication and can be exploited remotely, exposed Jenkins instances in European data centers or cloud environments are at heightened risk. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not mitigate the operational consequences of service unavailability.
Mitigation Recommendations
1. Upgrade Jenkins to a version later than 2.540 (or LTS later than 2.528.2) as soon as official patches or releases addressing CVE-2025-67635 become available. 2. Until patches are applied, restrict network access to Jenkins HTTP-based CLI interfaces by implementing strict firewall rules, VPN access, or network segmentation to limit exposure to trusted users and systems only. 3. Disable the HTTP CLI protocol if not required, or switch to more secure communication methods such as SSH-based CLI access. 4. Monitor Jenkins server logs and network traffic for abnormal or persistent CLI connection attempts that may indicate exploitation attempts or resource exhaustion. 5. Implement resource limits and connection timeouts on Jenkins servers to mitigate the impact of hanging or corrupted connections. 6. Regularly audit Jenkins configurations and access controls to ensure minimal exposure of management interfaces. 7. Incorporate Jenkins vulnerability scanning and patch management into the organization's security operations and DevSecOps practices to ensure timely detection and remediation of such vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Ireland, Belgium
CVE-2025-67635: Vulnerability in Jenkins Project Jenkins
Description
Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not properly close HTTP-based CLI connections when the connection stream becomes corrupted, allowing unauthenticated attackers to cause a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2025-67635 is a vulnerability identified in Jenkins, a widely used open-source automation server that facilitates continuous integration and continuous delivery (CI/CD). The flaw exists in Jenkins versions 2.540 and earlier, including the Long-Term Support (LTS) release 2.528.2 and earlier. The issue arises because Jenkins does not properly close HTTP-based Command Line Interface (CLI) connections when the connection stream becomes corrupted. This improper handling leads to resource exhaustion or hanging connections, which an unauthenticated attacker can exploit remotely to cause a denial of service (DoS) condition. The vulnerability is classified under CWE-404 (Improper Resource Shutdown or Release), indicating that the system fails to release resources correctly, leading to potential service disruption. The CVSS v3.1 base score is 7.5 (high severity), reflecting the network attack vector, no required privileges, no user interaction, and a high impact on availability, while confidentiality and integrity remain unaffected. No known exploits have been reported in the wild, and no official patches have been linked at the time of publication. The vulnerability affects Jenkins instances exposed to untrusted networks, especially those that allow HTTP-based CLI access without adequate network segmentation or access controls. Attackers can repeatedly send malformed or corrupted CLI connection streams, causing Jenkins to maintain open connections and eventually exhaust system resources, leading to service unavailability. This can disrupt automated build and deployment pipelines, impacting development velocity and operational continuity.
Potential Impact
For European organizations, the primary impact of CVE-2025-67635 is denial of service against Jenkins servers, which are critical components in modern software development and deployment workflows. Disruption of Jenkins services can halt CI/CD pipelines, delaying software releases, updates, and security patches, thereby increasing operational risk. Organizations relying on Jenkins for infrastructure automation, testing, or deployment may experience significant downtime, affecting business continuity and potentially causing financial losses. In sectors such as finance, telecommunications, manufacturing, and public services, where automation and rapid deployment are essential, this vulnerability could lead to cascading operational disruptions. Additionally, prolonged outages may increase the attack surface by forcing organizations to revert to manual processes or less secure alternatives. Since the vulnerability requires no authentication and can be exploited remotely, exposed Jenkins instances in European data centers or cloud environments are at heightened risk. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not mitigate the operational consequences of service unavailability.
Mitigation Recommendations
1. Upgrade Jenkins to a version later than 2.540 (or LTS later than 2.528.2) as soon as official patches or releases addressing CVE-2025-67635 become available. 2. Until patches are applied, restrict network access to Jenkins HTTP-based CLI interfaces by implementing strict firewall rules, VPN access, or network segmentation to limit exposure to trusted users and systems only. 3. Disable the HTTP CLI protocol if not required, or switch to more secure communication methods such as SSH-based CLI access. 4. Monitor Jenkins server logs and network traffic for abnormal or persistent CLI connection attempts that may indicate exploitation attempts or resource exhaustion. 5. Implement resource limits and connection timeouts on Jenkins servers to mitigate the impact of hanging or corrupted connections. 6. Regularly audit Jenkins configurations and access controls to ensure minimal exposure of management interfaces. 7. Incorporate Jenkins vulnerability scanning and patch management into the organization's security operations and DevSecOps practices to ensure timely detection and remediation of such vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jenkins
- Date Reserved
- 2025-12-09T17:33:01.215Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6939a66f62aa6c8a0e3c6b37
Added to database: 12/10/2025, 4:57:19 PM
Last enriched: 12/17/2025, 6:01:36 PM
Last updated: 2/6/2026, 7:39:45 AM
Views: 164
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2008: Code Injection in abhiphile fermat-mcp
MediumCVE-2026-2000: Command Injection in DCN DCME-320
MediumCVE-2026-1909: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in x-raym WaveSurfer-WP
MediumCVE-2026-1888: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in htplugins Docus – YouTube Video Playlist
MediumCVE-2026-1808: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ravanh Orange Comfort+ accessibility toolbar for WordPress
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.