Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68702: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in samrocketman jervis

0
High
VulnerabilityCVE-2025-68702cvecve-2025-68702cwe-327
Published: Tue Jan 13 2026 (01/13/2026, 19:26:32 UTC)
Source: CVE Database V5
Vendor/Project: samrocketman
Product: jervis

Description

CVE-2025-68702 is a high-severity vulnerability in the samrocketman Jervis library, used for Job DSL plugin scripts and Jenkins shared pipeline libraries. The issue arises from incorrect padding in cryptographic operations where padLeft(32, '0') is used instead of padLeft(64, '0') to handle SHA-256 hashes, which are 32 bytes or 64 hex characters long. This improper padding leads to the use of a broken or risky cryptographic algorithm (CWE-327), potentially weakening the security of cryptographic functions within affected Jenkins pipelines. The vulnerability affects all Jervis versions prior to 2. 2 and does not require authentication or user interaction to exploit, with a CVSS 4. 0 score of 8. 7 indicating high severity. Although no known exploits are currently in the wild, the flaw could allow attackers to compromise the integrity of pipeline scripts or related secrets. The issue is fixed in version 2. 2 of Jervis.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:58:52 UTC

Technical Analysis

CVE-2025-68702 identifies a cryptographic vulnerability in the samrocketman Jervis library, which is widely used to facilitate Job DSL plugin scripts and shared Jenkins pipeline libraries. The root cause is an incorrect padding implementation during cryptographic operations involving SHA-256 hashes. Specifically, Jervis versions prior to 2.2 use padLeft(32, '0') when they should use padLeft(64, '0'), since SHA-256 outputs 32 bytes, which correspond to 64 hexadecimal characters. This discrepancy leads to the use of a broken or risky cryptographic algorithm, classified under CWE-327. The incorrect padding can cause hash values to be truncated or malformed, potentially weakening the cryptographic strength and allowing attackers to manipulate or forge pipeline scripts or secrets that rely on these hashes for integrity verification. The vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality is none, but integrity is highly impacted, as attackers could alter pipeline behavior or inject malicious code. Availability is not affected. No known exploits have been reported in the wild yet, but the high CVSS score (8.7) reflects the criticality of the flaw. The issue was publicly disclosed in January 2026 and fixed in Jervis version 2.2. Organizations using Jenkins pipelines with Jervis versions below 2.2 should urgently upgrade to mitigate this vulnerability.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity of CI/CD pipelines that rely on Jenkins and the Jervis library. Compromised pipeline scripts could lead to unauthorized code execution, injection of malicious payloads, or manipulation of build and deployment processes. This can result in the deployment of backdoored software, data breaches, or disruption of critical services. Given the widespread use of Jenkins in European enterprises, especially in technology, finance, and manufacturing sectors, the vulnerability could have far-reaching consequences. The lack of required authentication or user interaction lowers the barrier for exploitation, increasing the threat level. While confidentiality is not directly impacted, the integrity compromise can indirectly lead to data exposure or system compromise. Organizations involved in critical infrastructure, software development, or cloud services are particularly at risk. Failure to patch could also lead to compliance violations under regulations like GDPR if the vulnerability is leveraged to exfiltrate personal data.

Mitigation Recommendations

European organizations should immediately upgrade all instances of the Jervis library to version 2.2 or later to remediate the vulnerability. In addition to upgrading, organizations should audit their Jenkins pipeline scripts and Job DSL configurations for any signs of tampering or anomalies that could indicate exploitation attempts. Implement strict access controls and monitoring on Jenkins environments to detect unauthorized changes. Employ cryptographic verification of pipeline scripts and artifacts where possible to ensure integrity. Regularly review and update CI/CD toolchains to incorporate security patches promptly. Consider isolating Jenkins environments and limiting network exposure to reduce attack surface. Finally, integrate security scanning tools that can detect usage of vulnerable Jervis versions and enforce compliance with secure software supply chain practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-23T22:32:51.733Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69669feba60475309fa994e2

Added to database: 1/13/2026, 7:41:31 PM

Last enriched: 1/21/2026, 2:58:52 AM

Last updated: 2/5/2026, 7:55:08 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats