Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68702: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in samrocketman jervis

0
High
VulnerabilityCVE-2025-68702cvecve-2025-68702cwe-327
Published: Tue Jan 13 2026 (01/13/2026, 19:26:32 UTC)
Source: CVE Database V5
Vendor/Project: samrocketman
Product: jervis

Description

CVE-2025-68702 is a high-severity vulnerability in the samrocketman Jervis library used for Jenkins Job DSL and shared pipeline scripts. The flaw arises from incorrect padding when handling SHA-256 hashes, where padLeft(32, '0') is used instead of padLeft(64, '0'), leading to improper cryptographic processing. This weakens the cryptographic integrity of operations relying on this hash handling, potentially allowing attackers to exploit the broken cryptographic assumptions. The vulnerability affects all Jervis versions prior to 2. 2 and does not require authentication or user interaction to exploit. While no known exploits are currently reported in the wild, the CVSS 8. 7 score indicates a significant risk. European organizations using Jenkins pipelines with Jervis <2. 2 could face risks to pipeline security and integrity. Mitigation involves upgrading to Jervis version 2.

AI-Powered Analysis

AILast updated: 01/13/2026, 19:56:18 UTC

Technical Analysis

CVE-2025-68702 identifies a cryptographic vulnerability in the Jervis library, a tool used to facilitate Job DSL plugin scripts and shared Jenkins pipeline libraries. The core issue is the misuse of padding length when processing SHA-256 hashes. SHA-256 outputs a 32-byte hash, which corresponds to 64 hexadecimal characters. However, versions of Jervis prior to 2.2 incorrectly use padLeft(32, '0'), effectively padding to only 32 hex characters instead of 64. This results in truncated or malformed hash representations, weakening the cryptographic strength and potentially allowing attackers to bypass integrity checks or manipulate pipeline logic that depends on these hashes. The vulnerability is classified under CWE-327, indicating the use of a broken or risky cryptographic algorithm or implementation. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N) shows that the vulnerability is remotely exploitable without authentication or user interaction, with high impact on integrity but no impact on confidentiality or availability. Although no exploits have been observed in the wild, the vulnerability poses a significant risk to continuous integration and deployment pipelines that rely on Jervis for secure job scripting. The fix was introduced in Jervis 2.2 by correcting the padding to padLeft(64, '0'), aligning with the correct SHA-256 hash length.

Potential Impact

For European organizations, this vulnerability could undermine the integrity of Jenkins pipeline scripts that use Jervis versions prior to 2.2. Attackers exploiting this flaw might manipulate job definitions or pipeline logic, potentially injecting malicious code or bypassing security controls embedded in the CI/CD process. This could lead to unauthorized code execution, supply chain compromise, or deployment of untrusted software artifacts. Since Jenkins is widely used across Europe in software development and DevOps environments, the risk extends to numerous sectors including finance, manufacturing, telecommunications, and government. The integrity compromise could also affect compliance with regulations such as GDPR if malicious code leads to data breaches or unauthorized data processing. The lack of confidentiality and availability impact reduces the risk of data leakage or service downtime directly from this vulnerability, but the integrity impact alone is critical for maintaining trust in automated build and deployment pipelines.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of the Jervis library to version 2.2 or later, where the padding issue is corrected. Organizations should audit their Jenkins environments to identify usage of Jervis and verify the version in use. For environments where immediate upgrade is not feasible, implementing additional integrity checks on pipeline scripts and job definitions can help detect tampering. Employing strict access controls on Jenkins job configuration and pipeline repositories reduces the risk of exploitation. Monitoring pipeline execution logs for anomalies and integrating security scanning tools that validate cryptographic operations in CI/CD workflows can provide early detection. Finally, educating DevOps teams about the importance of using updated libraries and secure cryptographic practices is essential to prevent similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-23T22:32:51.733Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69669feba60475309fa994e2

Added to database: 1/13/2026, 7:41:31 PM

Last enriched: 1/13/2026, 7:56:18 PM

Last updated: 1/13/2026, 9:47:10 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats