CVE-2025-67641: Vulnerability in Jenkins Project Jenkins Coverage Plugin
CVE-2025-67641 is a high-severity stored cross-site scripting (XSS) vulnerability in the Jenkins Coverage Plugin versions 2. 3054. ve1ff7b_a_a_123b_ and earlier. The flaw arises because the plugin does not properly validate the coverage results ID when configured via the REST API, allowing attackers with Item/Configure permission to inject a `javascript:` scheme URL as an identifier. This vulnerability requires authentication and user interaction but can lead to full compromise of confidentiality, integrity, and availability within the Jenkins environment. No known exploits are currently reported in the wild. The vulnerability impacts Jenkins installations using the Coverage Plugin, which is widely used in continuous integration pipelines, including in European organizations. Mitigation involves restricting Item/Configure permissions, monitoring REST API usage, and applying patches once available. Countries with significant software development sectors and Jenkins adoption, such as Germany, France, and the UK, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2025-67641 is a stored cross-site scripting (XSS) vulnerability found in the Jenkins Coverage Plugin, specifically in versions 2.3054.ve1ff7b_a_a_123b_ and earlier. The root cause is the plugin's failure to validate the coverage results ID when job configurations are created or modified through the Jenkins REST API. While the plugin validates this ID when submitted via the UI, the REST API path lacks this validation, allowing an attacker with Item/Configure permissions to inject a malicious `javascript:` scheme URL as the identifier. This malicious script is then stored and can execute in the context of users viewing the coverage results, leading to potential session hijacking, credential theft, or further exploitation within the Jenkins environment. The vulnerability requires the attacker to have authenticated access with Item/Configure permissions, which are typically granted to developers or build administrators. The CVSS v3.1 base score is 8.0, indicating high severity, with attack vector as network, low attack complexity, requiring privileges, and user interaction. The impact covers confidentiality, integrity, and availability, as successful exploitation could allow attackers to execute arbitrary scripts, manipulate build data, or disrupt CI/CD pipelines. No public exploits have been reported yet, but the vulnerability poses a significant risk given Jenkins' widespread use in automated software development workflows.
Potential Impact
For European organizations, this vulnerability poses a serious risk to the security of their continuous integration and delivery pipelines. Exploitation could lead to unauthorized code execution within Jenkins, allowing attackers to steal sensitive information such as credentials, inject malicious code into build artifacts, or disrupt software delivery processes. This could result in compromised software integrity, data breaches, and operational downtime. Organizations relying heavily on Jenkins for DevOps automation, especially those in regulated industries like finance, healthcare, and critical infrastructure, may face compliance violations and reputational damage. The requirement for Item/Configure permissions limits the attack surface but does not eliminate risk, as insiders or compromised developer accounts could be leveraged. The stored XSS nature means that multiple users interacting with Jenkins could be affected, amplifying the impact. Given the interconnected nature of modern development environments, a successful attack could cascade into broader network compromise.
Mitigation Recommendations
1. Immediately audit and restrict Item/Configure permissions to only trusted users to reduce the risk of malicious configuration changes via the REST API. 2. Monitor Jenkins REST API usage for unusual or unauthorized configuration changes, especially those involving the Coverage Plugin. 3. Implement network segmentation and access controls to limit Jenkins server exposure to only necessary personnel and systems. 4. Educate developers and administrators about the risks of stored XSS and the importance of secure plugin configuration. 5. Apply security hardening best practices for Jenkins, including enabling security realms and authorization strategies that enforce least privilege. 6. Stay alert for official patches or updates from the Jenkins project and apply them promptly once released. 7. Consider implementing Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the Coverage Plugin endpoints. 8. Regularly review and sanitize all user-generated inputs and configurations where possible to prevent injection attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-67641: Vulnerability in Jenkins Project Jenkins Coverage Plugin
Description
CVE-2025-67641 is a high-severity stored cross-site scripting (XSS) vulnerability in the Jenkins Coverage Plugin versions 2. 3054. ve1ff7b_a_a_123b_ and earlier. The flaw arises because the plugin does not properly validate the coverage results ID when configured via the REST API, allowing attackers with Item/Configure permission to inject a `javascript:` scheme URL as an identifier. This vulnerability requires authentication and user interaction but can lead to full compromise of confidentiality, integrity, and availability within the Jenkins environment. No known exploits are currently reported in the wild. The vulnerability impacts Jenkins installations using the Coverage Plugin, which is widely used in continuous integration pipelines, including in European organizations. Mitigation involves restricting Item/Configure permissions, monitoring REST API usage, and applying patches once available. Countries with significant software development sectors and Jenkins adoption, such as Germany, France, and the UK, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-67641 is a stored cross-site scripting (XSS) vulnerability found in the Jenkins Coverage Plugin, specifically in versions 2.3054.ve1ff7b_a_a_123b_ and earlier. The root cause is the plugin's failure to validate the coverage results ID when job configurations are created or modified through the Jenkins REST API. While the plugin validates this ID when submitted via the UI, the REST API path lacks this validation, allowing an attacker with Item/Configure permissions to inject a malicious `javascript:` scheme URL as the identifier. This malicious script is then stored and can execute in the context of users viewing the coverage results, leading to potential session hijacking, credential theft, or further exploitation within the Jenkins environment. The vulnerability requires the attacker to have authenticated access with Item/Configure permissions, which are typically granted to developers or build administrators. The CVSS v3.1 base score is 8.0, indicating high severity, with attack vector as network, low attack complexity, requiring privileges, and user interaction. The impact covers confidentiality, integrity, and availability, as successful exploitation could allow attackers to execute arbitrary scripts, manipulate build data, or disrupt CI/CD pipelines. No public exploits have been reported yet, but the vulnerability poses a significant risk given Jenkins' widespread use in automated software development workflows.
Potential Impact
For European organizations, this vulnerability poses a serious risk to the security of their continuous integration and delivery pipelines. Exploitation could lead to unauthorized code execution within Jenkins, allowing attackers to steal sensitive information such as credentials, inject malicious code into build artifacts, or disrupt software delivery processes. This could result in compromised software integrity, data breaches, and operational downtime. Organizations relying heavily on Jenkins for DevOps automation, especially those in regulated industries like finance, healthcare, and critical infrastructure, may face compliance violations and reputational damage. The requirement for Item/Configure permissions limits the attack surface but does not eliminate risk, as insiders or compromised developer accounts could be leveraged. The stored XSS nature means that multiple users interacting with Jenkins could be affected, amplifying the impact. Given the interconnected nature of modern development environments, a successful attack could cascade into broader network compromise.
Mitigation Recommendations
1. Immediately audit and restrict Item/Configure permissions to only trusted users to reduce the risk of malicious configuration changes via the REST API. 2. Monitor Jenkins REST API usage for unusual or unauthorized configuration changes, especially those involving the Coverage Plugin. 3. Implement network segmentation and access controls to limit Jenkins server exposure to only necessary personnel and systems. 4. Educate developers and administrators about the risks of stored XSS and the importance of secure plugin configuration. 5. Apply security hardening best practices for Jenkins, including enabling security realms and authorization strategies that enforce least privilege. 6. Stay alert for official patches or updates from the Jenkins project and apply them promptly once released. 7. Consider implementing Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the Coverage Plugin endpoints. 8. Regularly review and sanitize all user-generated inputs and configurations where possible to prevent injection attacks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jenkins
- Date Reserved
- 2025-12-09T17:33:01.216Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6939a66f62aa6c8a0e3c6b49
Added to database: 12/10/2025, 4:57:19 PM
Last enriched: 12/17/2025, 6:35:36 PM
Last updated: 2/7/2026, 12:25:04 PM
Views: 180
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.