Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67641: Vulnerability in Jenkins Project Jenkins Coverage Plugin

0
High
VulnerabilityCVE-2025-67641cvecve-2025-67641
Published: Wed Dec 10 2025 (12/10/2025, 16:50:39 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins Project
Product: Jenkins Coverage Plugin

Description

Jenkins Coverage Plugin 2.3054.ve1ff7b_a_a_123b_ and earlier does not validate the configured coverage results ID when creating coverage results, only when submitting the job configuration through the UI, allowing attackers with Item/Configure permission to use a `javascript:` scheme URL as identifier by configuring the job through the REST API, resulting in a stored cross-site scripting (XSS) vulnerability.

AI-Powered Analysis

AILast updated: 12/10/2025, 17:12:43 UTC

Technical Analysis

The Jenkins Coverage Plugin, widely used to measure code coverage in Jenkins continuous integration environments, contains a stored cross-site scripting (XSS) vulnerability identified as CVE-2025-67641. The vulnerability exists because the plugin does not validate the coverage results ID when coverage results are created programmatically via the REST API. While the plugin validates this ID during job configuration through the UI, this validation is absent in API calls. An attacker with Item/Configure permission can exploit this by submitting a malicious `javascript:` scheme URL as the coverage results ID, which is then stored and rendered in Jenkins interfaces. This stored XSS can execute arbitrary JavaScript in the context of users viewing the affected Jenkins pages, potentially leading to session hijacking, credential theft, or execution of further malicious actions within the Jenkins environment. The vulnerability requires the attacker to have at least Item/Configure permission, which is a moderate level of privilege typically granted to developers or build engineers. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. However, the vulnerability's presence in a critical CI/CD tool like Jenkins and the ability to execute persistent XSS makes it a significant risk. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps. Organizations relying on Jenkins for build automation and code coverage reporting should review their plugin versions and permissions to reduce exposure.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized execution of malicious scripts within Jenkins environments, compromising the confidentiality and integrity of build processes and potentially exposing sensitive source code or credentials. Attackers exploiting this flaw could hijack sessions of Jenkins users, escalate privileges, or inject malicious payloads into build pipelines, disrupting software delivery and increasing the risk of supply chain attacks. Given Jenkins' widespread use in software development across Europe, especially in technology, finance, and manufacturing sectors, this vulnerability could impact critical infrastructure and intellectual property. The requirement for Item/Configure permission limits exploitation to insiders or compromised accounts, but insider threats or credential theft scenarios remain plausible. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability is publicly known. The persistent nature of stored XSS means that multiple users could be affected over time, amplifying the impact. Disruption to CI/CD pipelines could delay software releases and increase operational costs.

Mitigation Recommendations

European organizations should immediately audit their Jenkins instances to identify usage of the Coverage Plugin versions 2.3054.ve1ff7b_a_a_123b_ or earlier. Until a patch is released, restrict Item/Configure permissions to the minimum necessary users to reduce the attack surface. Implement strict access controls and monitor for unusual configuration changes via the REST API. Use web application firewalls (WAFs) with rules to detect and block suspicious `javascript:` scheme URLs in API requests. Enable Content Security Policy (CSP) headers on Jenkins to mitigate the impact of XSS by restricting script execution sources. Regularly review Jenkins logs for signs of exploitation attempts or anomalous API activity. Educate Jenkins administrators and developers about the risk of granting excessive permissions and the importance of validating inputs in CI/CD tools. Once a patch becomes available, prioritize its deployment across all Jenkins instances. Consider isolating Jenkins environments and limiting network exposure to reduce the risk of lateral movement if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jenkins
Date Reserved
2025-12-09T17:33:01.216Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939a66f62aa6c8a0e3c6b49

Added to database: 12/10/2025, 4:57:19 PM

Last enriched: 12/10/2025, 5:12:43 PM

Last updated: 12/11/2025, 7:33:45 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats