Jenkins

87 CVEs vendor

Monthly

CVE-2026-33166 HIGH PATCH This Week

Path traversal in Allure report generator for Jenkins allows unauthenticated attackers to read arbitrary files from the host system by crafting malicious test result files with specially crafted attachment paths. The vulnerability stems from insufficient path validation when processing attachments during report generation, enabling sensitive files to be included in generated reports. A patch is not currently available.

Jenkins Path Traversal Information Disclosure Java
NVD GitHub VulDB
CVSS 3.1
8.6
EPSS
0.0%
CVE-2026-33004 MEDIUM PATCH This Month

The Jenkins LoadNinja Plugin version 2.1 and earlier fails to mask LoadNinja API keys displayed on the job configuration form, allowing attackers with access to the Jenkins web interface to observe and capture sensitive credentials. This information disclosure vulnerability affects Jenkins administrators and users with job configuration visibility, enabling credential theft that could lead to unauthorized access to LoadNinja services and associated testing infrastructure. No CVSS score, EPSS data, or active exploitation status (KEV listing) is currently available in public sources.

Jenkins Information Disclosure
NVD VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-33003 MEDIUM PATCH This Month

The Jenkins LoadNinja Plugin versions 2.1 and earlier stores LoadNinja API keys in plaintext within job configuration files (config.xml) on the Jenkins controller, allowing unauthorized disclosure of sensitive credentials. Users with Item/Extended Read permission on Jenkins jobs or direct file system access to the controller can extract these API keys, potentially leading to account compromise and unauthorized access to LoadNinja services. This is a straightforward credential exposure vulnerability with no complexity barriers to exploitation once access is gained.

Jenkins Information Disclosure
NVD VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-33002 HIGH PATCH This Week

Jenkins versions 2.442 through 2.554 and LTS 2.426.3 through 2.541.2 contain an origin validation bypass vulnerability in the CLI WebSocket endpoint that allows attackers to conduct DNS rebinding attacks. The vulnerability stems from improper use of Host and X-Forwarded-Host headers to compute expected request origins, enabling attackers to bypass authentication controls and potentially execute arbitrary commands through the CLI WebSocket interface. While no CVSS score, EPSS data, or active exploitation in the wild (KEV) status has been publicly disclosed, the vulnerability affects a critical Jenkins component and was responsibly disclosed by the Jenkins security team.

Jenkins Authentication Bypass
NVD VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-33001 HIGH PATCH This Week

Jenkins versions 2.554 and earlier (LTS 2.541.2 and earlier) contain a path traversal vulnerability in their handling of tar and tar.gz archive extraction that fails to safely process symbolic links, allowing attackers to write files to arbitrary filesystem locations. Attackers with Item/Configure permission or control over Jenkins agent processes can exploit this to deploy malicious scripts and plugins on the Jenkins controller, achieving code execution with the privileges of the Jenkins process. The vulnerability is particularly concerning because it affects the core Jenkins application and enables privilege escalation through plugin installation mechanisms.

Information Disclosure Jenkins
NVD VulDB
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-27100 MEDIUM PATCH This Month

Jenkins versions 2.550 and earlier fail to properly validate Run Parameter access controls, allowing authenticated users with Item/Build and Item/Configure permissions to enumerate sensitive information about jobs, builds, and their display names they should not have access to. This information disclosure vulnerability affects Jenkins LTS 2.541.1 and earlier, with no patch currently available. Attackers can exploit this to gather intelligence about build infrastructure by referencing builds outside their authorized scope.

Jenkins Redhat
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2026-27099 HIGH PATCH This Week

Jenkins versions 2.483-2.550 and LTS 2.492.1-2.541.1 contain a stored XSS vulnerability in the agent offline cause description field that fails to properly sanitize user input. Attackers with Agent/Configure or Agent/Disconnect permissions can inject malicious scripts that execute in the browsers of other users viewing the affected agent configuration. No patch is currently available for this vulnerability.

Jenkins XSS Redhat
NVD
CVSS 3.1
8.0
EPSS
0.0%
CVE-2025-68931 HIGH PATCH This Week

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, AES/CBC/PKCS5Padding lacks authentication, making it vulnerable to padding oracle attacks and ciphertext manipulation. [CVSS 7.5 HIGH]

Jenkins Jervis
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-68925 MEDIUM PATCH This Month

Jervis versions up to 2.2 is affected by improper verification of cryptographic signature (CVSS 5.3).

Jenkins Jervis
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-68704 HIGH PATCH This Week

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses java.util.Random() which is not cryptographically secure for timing attack mitigation. [CVSS 7.5 HIGH]

Java Jenkins Jervis
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-68703 HIGH PATCH This Week

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, the salt is derived from sha256Sum(passphrase). [CVSS 7.5 HIGH]

Jenkins Jervis
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-68702 HIGH PATCH This Week

Jervis versions up to 2.2 is affected by use of a broken or risky cryptographic algorithm (CVSS 7.5).

Jenkins Jervis
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-68701 HIGH PATCH This Week

Jervis versions up to 2.2 is affected by use of a broken or risky cryptographic algorithm (CVSS 7.5).

Jenkins Jervis
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-68698 HIGH PATCH This Week

Jervis versions up to 2.2 is affected by use of a broken or risky cryptographic algorithm (CVSS 7.5).

Jenkins Jervis
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-13472 MEDIUM PATCH This Month

A remote code execution vulnerability in BlazeMeter Jenkins Plugin (CVSS 5.3) that allows users only with certain permissions. Remediation should follow standard vulnerability management procedures.

Authentication Bypass Jenkins
NVD GitHub
CVSS 4.0
5.3
EPSS
0.0%
CVE-2025-34212 HIGH POC This Week

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.843 and Application prior to version 20.0.1923 (VA/SaaS deployments) possess CI/CD weaknesses: the build pulls an. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

RCE Jenkins Virtual Appliance Application Virtual Appliance Host
NVD
CVSS 4.0
8.7
EPSS
0.2%
CVE-2025-59476 MEDIUM PATCH This Month

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not restrict or transform the characters that can be inserted from user-specified content in log messages, allowing attackers able to control. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Jenkins Redhat
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-59475 MEDIUM PATCH Monitor

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check for the authenticated user profile dropdown menu, allowing attackers without Overall/Read permission to obtain. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Redhat
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-59474 MEDIUM PATCH This Month

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check in the sidepanel of a page intentionally accessible to users lacking Overall/Read permission, allowing attackers. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Redhat
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-58460 MEDIUM PATCH Monitor

A missing permission check in Jenkins OpenTelemetry Plugin 3.1543.v8446b_92b_cd64 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using. Rated medium severity (CVSS 4.2), this vulnerability is remotely exploitable. No vendor patch available.

Authentication Bypass Jenkins Opentelemetry
NVD
CVSS 3.1
4.2
EPSS
0.0%
CVE-2025-58459 MEDIUM PATCH Monitor

Jenkins global-build-stats Plugin 322.v22f4db_18e2dd and earlier does not perform permission checks in its REST API endpoints, allowing attackers with Overall/Read permission to enumerate graph IDs. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Global Build Stats
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-58458 MEDIUM PATCH Monitor

In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Jenkins Information Disclosure Git Client
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-53743 MEDIUM This Month

Jenkins Applitools Eyes Plugin 1.16.5 and earlier does not mask Applitools API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.

Information Disclosure Jenkins Applitools Eyes
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-53742 MEDIUM This Month

Jenkins Applitools Eyes Plugin 1.16.5 and earlier stores Applitools API keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins Applitools Eyes
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53678 MEDIUM This Month

Jenkins User1st uTester Plugin 1.1 and earlier stores the uTester JWT token unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.

Information Disclosure Jenkins User1st Utester
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53677 MEDIUM This Month

CVE-2025-53677 is a security vulnerability (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Xooa
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-53676 MEDIUM This Month

Jenkins Xooa Plugin 0.0.7 and earlier stores the Xooa Deployment Token unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.

Information Disclosure Jenkins Xooa
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53675 MEDIUM This Month

CVE-2025-53675 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Warrior Framework
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-53674 MEDIUM This Month

CVE-2025-53674 is a security vulnerability (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Sensedia Api Platform Tools
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-53673 MEDIUM This Month

Jenkins Sensedia Api Platform tools Plugin 1.0 stores the Sensedia API Manager integration token unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.

Information Disclosure Jenkins Sensedia Api Platform Tools
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53672 MEDIUM This Month

Jenkins Kryptowire Plugin 0.2 and earlier stores the Kryptowire API key unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.

Information Disclosure Jenkins Kryptowire
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53671 MEDIUM This Month

CVE-2025-53671 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Nouvola Divecloud
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53670 MEDIUM This Month

Jenkins Nouvola DiveCloud Plugin 1.08 and earlier stores DiveCloud API Keys and Credentials Encryption Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins Nouvola Divecloud
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53669 MEDIUM This Month

CVE-2025-53669 is a security vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Vaddy
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-53668 MEDIUM This Month

Jenkins VAddy Plugin 1.2.8 and earlier stores Vaddy API Auth Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins Vaddy
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53667 MEDIUM This Month

Jenkins Dead Man's Snitch Plugin 0.1 does not mask Dead Man's Snitch tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.

Information Disclosure Jenkins
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-53666 MEDIUM This Month

Jenkins Dead Man's Snitch Plugin 0.1 stores Dead Man's Snitch tokens unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53665 MEDIUM This Month

CVE-2025-53665 is a security vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Apica Loadtest
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-53664 MEDIUM This Month

CVE-2025-53664 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Apica Loadtest
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-53663 MEDIUM This Month

Jenkins IBM Cloud DevOps Plugin 2.0.16 and earlier stores SonarQube authentication tokens unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins IBM Ibm Cloud Devops
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53662 MEDIUM This Month

CVE-2025-53662 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Ifttt Build Notifier
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-53661 MEDIUM This Month

Jenkins Testsigma Test Plan run Plugin 1.6 and earlier does not mask Testsigma API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.

Information Disclosure Jenkins Testsigma Test Plan Run
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-53660 MEDIUM This Month

CVE-2025-53660 is a security vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Qmetry Test Management
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-53659 MEDIUM This Month

Jenkins QMetry Test Management Plugin 1.13 and earlier stores Qmetry Automation API Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins Qmetry Test Management
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53658 MEDIUM PATCH This Month

Jenkins Applitools Eyes Plugin 1.16.5 and earlier does not escape the Applitools URL on the build page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

XSS Jenkins Applitools Eyes
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-53657 MEDIUM This Month

Jenkins ReadyAPI Functional Testing Plugin 1.11 and earlier does not mask SLM License Access Keys, client secrets, and passwords displayed on the job configuration form, increasing the potential for attackers to observe and capture them.

Information Disclosure Jenkins Readyapi Functional Testing
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-53656 MEDIUM This Month

CVE-2025-53656 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Readyapi Functional Testing
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-53655 MEDIUM This Month

CVE-2025-53655 is a security vulnerability (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Statistics Gatherer
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-53654 MEDIUM This Month

Jenkins Statistics Gatherer Plugin 2.0.3 and earlier stores the AWS Secret Key unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.

Information Disclosure Jenkins Statistics Gatherer
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53653 MEDIUM This Month

Jenkins Aqua Security Scanner Plugin 3.2.8 and earlier stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins Aqua Security Scanner
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-53652 HIGH PATCH This Week

Jenkins Git Parameter Plugin 439.vb_0e46ca_14534 and earlier does not validate that the Git parameter value submitted to the build matches one of the offered choices, allowing attackers with Item/Build permission to inject arbitrary values into Git parameters.

Code Injection Jenkins Git Parameter
NVD GitHub
CVSS 3.1
8.2
EPSS
0.0%
CVE-2025-53651 MEDIUM PATCH This Month

CVE-2025-53651 is a security vulnerability (CVSS 6.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Html Publisher
NVD GitHub
CVSS 3.1
6.3
EPSS
0.2%
CVE-2025-53650 HIGH PATCH This Week

Jenkins Credentials Binding Plugin 687.v619cb_15e923f and earlier does not properly mask (i.e., replace with asterisks) credentials present in exception error messages that are written to the build log.

Information Disclosure Jenkins Credentials Binding
NVD GitHub
CVSS 3.1
7.3
EPSS
0.1%
CVE-2024-9453 MEDIUM This Month

A vulnerability was found in Red Hat OpenShift Jenkins. The bearer token is not obfuscated in the logs and potentially carries a high risk if those logs are centralized when collected. The token is typically valid for one year. This flaw allows a malicious user to jeopardize the environment if they have access to sensitive information.

Jenkins Information Disclosure Redhat
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-5806 HIGH PATCH This Week

A cross-site scripting vulnerability (CVSS 8.0). High severity vulnerability requiring prompt remediation.

XSS Jenkins Java Gatling
NVD GitHub
CVSS 3.1
8.0
EPSS
0.0%
CVE-2025-47889 CRITICAL Act Now

In Jenkins WSO2 Oauth Plugin 1.0 and earlier, authentication claims are accepted without validation by the "WSO2 Oauth" security realm, allowing unauthenticated attackers to log in to controllers. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Wso2 Oauth
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-47888 MEDIUM This Month

Jenkins DingTalk Plugin 2.7.3 and earlier unconditionally disables SSL/TLS certificate and hostname validation for connections to the configured DingTalk webhooks. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable. No vendor patch available.

Information Disclosure Jenkins Dingtalk
NVD
CVSS 3.1
5.9
EPSS
0.2%
CVE-2025-47887 MEDIUM PATCH This Month

Missing permission checks in Jenkins Cadence vManager Plugin 4.0.1-286.v9e25a_740b_a_48 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Cadence Vmanager
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-47886 MEDIUM PATCH This Month

A cross-site request forgery (CSRF) vulnerability in Jenkins Cadence vManager Plugin 4.0.1-286.v9e25a_740b_a_48 and earlier allows attackers to connect to an attacker-specified URL using. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

CSRF Jenkins Cadence Vmanager
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-47885 HIGH PATCH This Month

Jenkins Health Advisor by CloudBees Plugin 374.v194b_d4f0c8c8 and earlier does not escape responses from the Jenkins Health Advisor server, resulting in a stored cross-site scripting (XSS). Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

XSS Jenkins Health Advisor By Cloudbees
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-47884 CRITICAL PATCH This Week

In Jenkins OpenID Connect Provider Plugin 96.vee8ed882ec4d and earlier the generation of build ID Tokens uses potentially overridden values of environment variables, in conjunction with certain other. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Openid Connect Provider
NVD
CVSS 3.1
9.1
EPSS
0.9%
CVE-2025-32755 CRITICAL Act Now

In jenkins/ssh-slave Docker images based on Debian, SSH host keys are generated on image creation for images based on Debian, causing all containers based on images of the same version use the same. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Docker Jenkins Debian Ssh Slave
NVD
CVSS 3.1
9.1
EPSS
0.2%
CVE-2025-32754 CRITICAL Act Now

In jenkins/ssh-agent Docker images 6.11.1 and earlier, SSH host keys are generated on image creation for images based on Debian, causing all containers based on images of the same version use the. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Docker Jenkins Debian Ssh Agent
NVD
CVSS 3.1
9.1
EPSS
0.2%
CVE-2025-31728 MEDIUM This Month

Jenkins AsakusaSatellite Plugin 0.1.1 and earlier does not mask AsakusaSatellite API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jenkins Asakusasatellite
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-31727 MEDIUM This Month

Jenkins AsakusaSatellite Plugin 0.1.1 and earlier stores AsakusaSatellite API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jenkins Asakusasatellite
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-31726 MEDIUM This Month

Jenkins Stack Hammer Plugin 1.0.6 and earlier stores Stack Hammer API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Stack Hammer
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-31725 MEDIUM This Month

Jenkins monitor-remote-job Plugin 1.0 stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Monitor Remote Job
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-31724 MEDIUM PATCH This Month

Jenkins Cadence vManager Plugin 4.0.0-282.v5096a_c2db_275 and earlier stores Verisium Manager vAPI keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jenkins Cadence Vmanager
NVD
CVSS 3.1
4.3
EPSS
0.5%
CVE-2025-31723 MEDIUM PATCH This Month

A cross-site request forgery (CSRF) vulnerability in Jenkins Simple Queue Plugin 1.4.6 and earlier allows attackers to change and reset the build queue order. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

CSRF Jenkins Simple Queue
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-31722 HIGH PATCH This Week

In Jenkins Templating Engine Plugin 2.5.3 and earlier, libraries defined in folders are not subject to sandbox protection, allowing attackers with Item/Configure permission to execute arbitrary code. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

RCE Code Injection Jenkins Templating Engine
NVD
CVSS 3.1
8.8
EPSS
1.1%
CVE-2025-31721 MEDIUM PATCH This Month

A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Configure permission to copy an agent, gaining. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Redhat
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-31720 MEDIUM PATCH This Month

A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Extended Read permission to copy an agent,. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Redhat
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-30197 LOW PATCH Monitor

Jenkins Zoho QEngine Plugin 1.0.29.vfa_cc23396502 and earlier does not mask the QEngine API Key form field, increasing the potential for attackers to observe and capture it. Rated low severity (CVSS 3.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Information Disclosure Jenkins Zoho Qengine
NVD
CVSS 3.1
3.1
EPSS
0.0%
CVE-2025-30196 MEDIUM This Month

Jenkins AnchorChain Plugin 1.0 does not limit URL schemes for links it creates based on workspace content, allowing the `javascript:` scheme, resulting in a stored cross-site scripting (XSS). Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

XSS Jenkins Anchorchain
NVD
CVSS 3.1
6.5
EPSS
0.2%
CVE-2025-27625 MEDIUM PATCH This Month

In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash (`\`) characters are considered safe, allowing attackers to perform phishing attacks by having users go to a. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Open Redirect Jenkins Redhat
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-27624 MEDIUM PATCH This Month

A cross-site request forgery (CSRF) vulnerability in Jenkins 2.499 and earlier, LTS 2.492.1 and earlier allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

CSRF Jenkins Redhat
NVD
CVSS 3.1
5.4
EPSS
0.1%
CVE-2025-27623 MEDIUM PATCH This Month

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of views via REST API or CLI, allowing attackers with View/Read permission. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jenkins Redhat
NVD
CVSS 3.1
4.3
EPSS
0.3%
CVE-2025-27622 MEDIUM PATCH This Month

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of agents via REST API or CLI, allowing attackers with Agent/Extended Read. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jenkins Redhat
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-0148 LOW PATCH Monitor

Missing password field masking in the Zoom Jenkins Marketplace plugin before version 1.6 may allow an unauthenticated user to conduct a disclosure of information via adjacent network access. Rated low severity (CVSS 2.6), this vulnerability is no authentication required. No vendor patch available.

Information Disclosure Jenkins
NVD
CVSS 3.1
2.6
EPSS
0.1%
CVE-2025-0142 MEDIUM PATCH Monitor

Cleartext storage of sensitive information in the Zoom Jenkins Marketplace plugin before version 1.4 may allow an authenticated user to conduct a disclosure of information via network access. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jenkins
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-24403 MEDIUM Monitor

A missing permission check in Jenkins Azure Service Fabric Plugin 1.6 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of Azure credentials stored in Jenkins. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Microsoft Authentication Bypass Jenkins Azure Service Fabric
NVD
CVSS 3.1
4.3
EPSS
0.5%
CVE-2025-24402 MEDIUM Monitor

A cross-site request forgery (CSRF) vulnerability in Jenkins Azure Service Fabric Plugin 1.6 and earlier allows attackers to connect to a Service Fabric URL using attacker-specified credentials IDs. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Microsoft CSRF Jenkins Azure Service Fabric
NVD
CVSS 3.1
4.3
EPSS
0.6%
CVE-2025-24401 MEDIUM This Month

Jenkins Folder-based Authorization Strategy Plugin 217.vd5b_18537403e and earlier does not verify that permissions configured to be granted are enabled, potentially allowing users formerly granted. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Folder Based Authorization Strategy
NVD
CVSS 3.1
6.8
EPSS
0.1%
CVE-2025-24400 MEDIUM PATCH Monitor

Jenkins Eiffel Broadcaster Plugin 2.8.0 through 2.10.2 (both inclusive) uses the credential ID as the cache key during signing operations, allowing attackers able to create a credential with the same. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Eiffel Broadcaster
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-24399 HIGH PATCH This Month

Jenkins OpenId Connect Authentication Plugin 4.452.v2849b_d3945fa_ and earlier, except 4.438.440.v3f5f201de5dc, treats usernames as case-insensitive, allowing attackers on Jenkins instances. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Privilege Escalation Jenkins Openid Connect Authentication
NVD
CVSS 3.1
8.8
EPSS
0.4%
CVE-2025-24398 HIGH PATCH This Month

Jenkins Bitbucket Server Integration Plugin 2.1.0 through 4.1.3 (both inclusive) allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

CSRF Jenkins Bitbucket Server Integration
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-24397 MEDIUM PATCH Monitor

An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Gitlab Jenkins
NVD
CVSS 3.1
4.3
EPSS
0.7%
CVE-2026-33166
EPSS 0% CVSS 8.6
HIGH PATCH This Week

Path traversal in Allure report generator for Jenkins allows unauthenticated attackers to read arbitrary files from the host system by crafting malicious test result files with specially crafted attachment paths. The vulnerability stems from insufficient path validation when processing attachments during report generation, enabling sensitive files to be included in generated reports. A patch is not currently available.

Jenkins Path Traversal Information Disclosure +1
NVD GitHub VulDB
CVE-2026-33004
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

The Jenkins LoadNinja Plugin version 2.1 and earlier fails to mask LoadNinja API keys displayed on the job configuration form, allowing attackers with access to the Jenkins web interface to observe and capture sensitive credentials. This information disclosure vulnerability affects Jenkins administrators and users with job configuration visibility, enabling credential theft that could lead to unauthorized access to LoadNinja services and associated testing infrastructure. No CVSS score, EPSS data, or active exploitation status (KEV listing) is currently available in public sources.

Jenkins Information Disclosure
NVD VulDB
CVE-2026-33003
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

The Jenkins LoadNinja Plugin versions 2.1 and earlier stores LoadNinja API keys in plaintext within job configuration files (config.xml) on the Jenkins controller, allowing unauthorized disclosure of sensitive credentials. Users with Item/Extended Read permission on Jenkins jobs or direct file system access to the controller can extract these API keys, potentially leading to account compromise and unauthorized access to LoadNinja services. This is a straightforward credential exposure vulnerability with no complexity barriers to exploitation once access is gained.

Jenkins Information Disclosure
NVD VulDB
CVE-2026-33002
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Jenkins versions 2.442 through 2.554 and LTS 2.426.3 through 2.541.2 contain an origin validation bypass vulnerability in the CLI WebSocket endpoint that allows attackers to conduct DNS rebinding attacks. The vulnerability stems from improper use of Host and X-Forwarded-Host headers to compute expected request origins, enabling attackers to bypass authentication controls and potentially execute arbitrary commands through the CLI WebSocket interface. While no CVSS score, EPSS data, or active exploitation in the wild (KEV) status has been publicly disclosed, the vulnerability affects a critical Jenkins component and was responsibly disclosed by the Jenkins security team.

Jenkins Authentication Bypass
NVD VulDB
CVE-2026-33001
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Jenkins versions 2.554 and earlier (LTS 2.541.2 and earlier) contain a path traversal vulnerability in their handling of tar and tar.gz archive extraction that fails to safely process symbolic links, allowing attackers to write files to arbitrary filesystem locations. Attackers with Item/Configure permission or control over Jenkins agent processes can exploit this to deploy malicious scripts and plugins on the Jenkins controller, achieving code execution with the privileges of the Jenkins process. The vulnerability is particularly concerning because it affects the core Jenkins application and enables privilege escalation through plugin installation mechanisms.

Information Disclosure Jenkins
NVD VulDB
CVE-2026-27100
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Jenkins versions 2.550 and earlier fail to properly validate Run Parameter access controls, allowing authenticated users with Item/Build and Item/Configure permissions to enumerate sensitive information about jobs, builds, and their display names they should not have access to. This information disclosure vulnerability affects Jenkins LTS 2.541.1 and earlier, with no patch currently available. Attackers can exploit this to gather intelligence about build infrastructure by referencing builds outside their authorized scope.

Jenkins Redhat
NVD
CVE-2026-27099
EPSS 0% CVSS 8.0
HIGH PATCH This Week

Jenkins versions 2.483-2.550 and LTS 2.492.1-2.541.1 contain a stored XSS vulnerability in the agent offline cause description field that fails to properly sanitize user input. Attackers with Agent/Configure or Agent/Disconnect permissions can inject malicious scripts that execute in the browsers of other users viewing the affected agent configuration. No patch is currently available for this vulnerability.

Jenkins XSS Redhat
NVD
CVE-2025-68931
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, AES/CBC/PKCS5Padding lacks authentication, making it vulnerable to padding oracle attacks and ciphertext manipulation. [CVSS 7.5 HIGH]

Jenkins Jervis
NVD GitHub
CVE-2025-68925
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Jervis versions up to 2.2 is affected by improper verification of cryptographic signature (CVSS 5.3).

Jenkins Jervis
NVD GitHub
CVE-2025-68704
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses java.util.Random() which is not cryptographically secure for timing attack mitigation. [CVSS 7.5 HIGH]

Java Jenkins Jervis
NVD GitHub
CVE-2025-68703
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, the salt is derived from sha256Sum(passphrase). [CVSS 7.5 HIGH]

Jenkins Jervis
NVD GitHub
CVE-2025-68702
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Jervis versions up to 2.2 is affected by use of a broken or risky cryptographic algorithm (CVSS 7.5).

Jenkins Jervis
NVD GitHub
CVE-2025-68701
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Jervis versions up to 2.2 is affected by use of a broken or risky cryptographic algorithm (CVSS 7.5).

Jenkins Jervis
NVD GitHub
CVE-2025-68698
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Jervis versions up to 2.2 is affected by use of a broken or risky cryptographic algorithm (CVSS 7.5).

Jenkins Jervis
NVD GitHub
CVE-2025-13472
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

A remote code execution vulnerability in BlazeMeter Jenkins Plugin (CVSS 5.3) that allows users only with certain permissions. Remediation should follow standard vulnerability management procedures.

Authentication Bypass Jenkins
NVD GitHub
CVE-2025-34212
EPSS 0% CVSS 8.7
HIGH POC This Week

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.843 and Application prior to version 20.0.1923 (VA/SaaS deployments) possess CI/CD weaknesses: the build pulls an. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

RCE Jenkins Virtual Appliance Application +1
NVD
CVE-2025-59476
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not restrict or transform the characters that can be inserted from user-specified content in log messages, allowing attackers able to control. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Jenkins Redhat
NVD
CVE-2025-59475
EPSS 0% CVSS 4.3
MEDIUM PATCH Monitor

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check for the authenticated user profile dropdown menu, allowing attackers without Overall/Read permission to obtain. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Redhat
NVD
CVE-2025-59474
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check in the sidepanel of a page intentionally accessible to users lacking Overall/Read permission, allowing attackers. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Redhat
NVD
CVE-2025-58460
EPSS 0% CVSS 4.2
MEDIUM PATCH Monitor

A missing permission check in Jenkins OpenTelemetry Plugin 3.1543.v8446b_92b_cd64 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using. Rated medium severity (CVSS 4.2), this vulnerability is remotely exploitable. No vendor patch available.

Authentication Bypass Jenkins Opentelemetry
NVD
CVE-2025-58459
EPSS 0% CVSS 4.3
MEDIUM PATCH Monitor

Jenkins global-build-stats Plugin 322.v22f4db_18e2dd and earlier does not perform permission checks in its REST API endpoints, allowing attackers with Overall/Read permission to enumerate graph IDs. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Global Build Stats
NVD
CVE-2025-58458
EPSS 0% CVSS 4.3
MEDIUM PATCH Monitor

In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Jenkins Information Disclosure Git Client
NVD
CVE-2025-53743
EPSS 0% CVSS 5.3
MEDIUM This Month

Jenkins Applitools Eyes Plugin 1.16.5 and earlier does not mask Applitools API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.

Information Disclosure Jenkins Applitools Eyes
NVD GitHub
CVE-2025-53742
EPSS 0% CVSS 6.5
MEDIUM This Month

Jenkins Applitools Eyes Plugin 1.16.5 and earlier stores Applitools API keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins Applitools Eyes
NVD GitHub
CVE-2025-53678
EPSS 0% CVSS 6.5
MEDIUM This Month

Jenkins User1st uTester Plugin 1.1 and earlier stores the uTester JWT token unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.

Information Disclosure Jenkins User1st Utester
NVD GitHub
CVE-2025-53677
EPSS 0% CVSS 5.3
MEDIUM This Month

CVE-2025-53677 is a security vulnerability (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Xooa
NVD GitHub
CVE-2025-53676
EPSS 0% CVSS 6.5
MEDIUM This Month

Jenkins Xooa Plugin 0.0.7 and earlier stores the Xooa Deployment Token unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.

Information Disclosure Jenkins Xooa
NVD GitHub
CVE-2025-53675
EPSS 0% CVSS 6.5
MEDIUM This Month

CVE-2025-53675 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Warrior Framework
NVD GitHub
CVE-2025-53674
EPSS 0% CVSS 5.3
MEDIUM This Month

CVE-2025-53674 is a security vulnerability (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Sensedia Api Platform Tools
NVD GitHub
CVE-2025-53673
EPSS 0% CVSS 6.5
MEDIUM This Month

Jenkins Sensedia Api Platform tools Plugin 1.0 stores the Sensedia API Manager integration token unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.

Information Disclosure Jenkins Sensedia Api Platform Tools
NVD GitHub
CVE-2025-53672
EPSS 0% CVSS 6.5
MEDIUM This Month

Jenkins Kryptowire Plugin 0.2 and earlier stores the Kryptowire API key unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.

Information Disclosure Jenkins Kryptowire
NVD GitHub
CVE-2025-53671
EPSS 0% CVSS 6.5
MEDIUM This Month

CVE-2025-53671 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Nouvola Divecloud
NVD GitHub
CVE-2025-53670
EPSS 0% CVSS 6.5
MEDIUM This Month

Jenkins Nouvola DiveCloud Plugin 1.08 and earlier stores DiveCloud API Keys and Credentials Encryption Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins Nouvola Divecloud
NVD GitHub
CVE-2025-53669
EPSS 0% CVSS 4.3
MEDIUM This Month

CVE-2025-53669 is a security vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Vaddy
NVD GitHub
CVE-2025-53668
EPSS 0% CVSS 6.5
MEDIUM This Month

Jenkins VAddy Plugin 1.2.8 and earlier stores Vaddy API Auth Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins Vaddy
NVD GitHub
CVE-2025-53667
EPSS 0% CVSS 5.3
MEDIUM This Month

Jenkins Dead Man's Snitch Plugin 0.1 does not mask Dead Man's Snitch tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.

Information Disclosure Jenkins
NVD GitHub
CVE-2025-53666
EPSS 0% CVSS 6.5
MEDIUM This Month

Jenkins Dead Man's Snitch Plugin 0.1 stores Dead Man's Snitch tokens unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins
NVD GitHub
CVE-2025-53665
EPSS 0% CVSS 4.3
MEDIUM This Month

CVE-2025-53665 is a security vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Apica Loadtest
NVD GitHub
CVE-2025-53664
EPSS 0% CVSS 6.5
MEDIUM This Month

CVE-2025-53664 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Apica Loadtest
NVD GitHub
CVE-2025-53663
EPSS 0% CVSS 6.5
MEDIUM This Month

Jenkins IBM Cloud DevOps Plugin 2.0.16 and earlier stores SonarQube authentication tokens unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins IBM +1
NVD GitHub
CVE-2025-53662
EPSS 0% CVSS 6.5
MEDIUM This Month

CVE-2025-53662 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Ifttt Build Notifier
NVD GitHub
CVE-2025-53661
EPSS 0% CVSS 4.3
MEDIUM This Month

Jenkins Testsigma Test Plan run Plugin 1.6 and earlier does not mask Testsigma API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.

Information Disclosure Jenkins Testsigma Test Plan Run
NVD GitHub
CVE-2025-53660
EPSS 0% CVSS 4.3
MEDIUM This Month

CVE-2025-53660 is a security vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Qmetry Test Management
NVD GitHub
CVE-2025-53659
EPSS 0% CVSS 6.5
MEDIUM This Month

Jenkins QMetry Test Management Plugin 1.13 and earlier stores Qmetry Automation API Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins Qmetry Test Management
NVD GitHub
CVE-2025-53658
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Jenkins Applitools Eyes Plugin 1.16.5 and earlier does not escape the Applitools URL on the build page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

XSS Jenkins Applitools Eyes
NVD GitHub
CVE-2025-53657
EPSS 0% CVSS 4.3
MEDIUM This Month

Jenkins ReadyAPI Functional Testing Plugin 1.11 and earlier does not mask SLM License Access Keys, client secrets, and passwords displayed on the job configuration form, increasing the potential for attackers to observe and capture them.

Information Disclosure Jenkins Readyapi Functional Testing
NVD GitHub
CVE-2025-53656
EPSS 0% CVSS 6.5
MEDIUM This Month

CVE-2025-53656 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Readyapi Functional Testing
NVD GitHub
CVE-2025-53655
EPSS 0% CVSS 5.3
MEDIUM This Month

CVE-2025-53655 is a security vulnerability (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Statistics Gatherer
NVD GitHub
CVE-2025-53654
EPSS 0% CVSS 6.5
MEDIUM This Month

Jenkins Statistics Gatherer Plugin 2.0.3 and earlier stores the AWS Secret Key unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.

Information Disclosure Jenkins Statistics Gatherer
NVD GitHub
CVE-2025-53653
EPSS 0% CVSS 4.3
MEDIUM This Month

Jenkins Aqua Security Scanner Plugin 3.2.8 and earlier stores Scanner Tokens for Aqua API unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Information Disclosure Jenkins Aqua Security Scanner
NVD GitHub
CVE-2025-53652
EPSS 0% CVSS 8.2
HIGH PATCH This Week

Jenkins Git Parameter Plugin 439.vb_0e46ca_14534 and earlier does not validate that the Git parameter value submitted to the build matches one of the offered choices, allowing attackers with Item/Build permission to inject arbitrary values into Git parameters.

Code Injection Jenkins Git Parameter
NVD GitHub
CVE-2025-53651
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

CVE-2025-53651 is a security vulnerability (CVSS 6.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Jenkins Html Publisher
NVD GitHub
CVE-2025-53650
EPSS 0% CVSS 7.3
HIGH PATCH This Week

Jenkins Credentials Binding Plugin 687.v619cb_15e923f and earlier does not properly mask (i.e., replace with asterisks) credentials present in exception error messages that are written to the build log.

Information Disclosure Jenkins Credentials Binding
NVD GitHub
CVE-2024-9453
EPSS 0% CVSS 6.5
MEDIUM This Month

A vulnerability was found in Red Hat OpenShift Jenkins. The bearer token is not obfuscated in the logs and potentially carries a high risk if those logs are centralized when collected. The token is typically valid for one year. This flaw allows a malicious user to jeopardize the environment if they have access to sensitive information.

Jenkins Information Disclosure Redhat
NVD
CVE-2025-5806
EPSS 0% CVSS 8.0
HIGH PATCH This Week

A cross-site scripting vulnerability (CVSS 8.0). High severity vulnerability requiring prompt remediation.

XSS Jenkins Java +1
NVD GitHub
CVE-2025-47889
EPSS 0% CVSS 9.8
CRITICAL Act Now

In Jenkins WSO2 Oauth Plugin 1.0 and earlier, authentication claims are accepted without validation by the "WSO2 Oauth" security realm, allowing unauthenticated attackers to log in to controllers. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Wso2 Oauth
NVD
CVE-2025-47888
EPSS 0% CVSS 5.9
MEDIUM This Month

Jenkins DingTalk Plugin 2.7.3 and earlier unconditionally disables SSL/TLS certificate and hostname validation for connections to the configured DingTalk webhooks. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable. No vendor patch available.

Information Disclosure Jenkins Dingtalk
NVD
CVE-2025-47887
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Missing permission checks in Jenkins Cadence vManager Plugin 4.0.1-286.v9e25a_740b_a_48 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Cadence Vmanager
NVD
CVE-2025-47886
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

A cross-site request forgery (CSRF) vulnerability in Jenkins Cadence vManager Plugin 4.0.1-286.v9e25a_740b_a_48 and earlier allows attackers to connect to an attacker-specified URL using. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

CSRF Jenkins Cadence Vmanager
NVD
CVE-2025-47885
EPSS 0% CVSS 8.8
HIGH PATCH This Month

Jenkins Health Advisor by CloudBees Plugin 374.v194b_d4f0c8c8 and earlier does not escape responses from the Jenkins Health Advisor server, resulting in a stored cross-site scripting (XSS). Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

XSS Jenkins Health Advisor By Cloudbees
NVD
CVE-2025-47884
EPSS 1% CVSS 9.1
CRITICAL PATCH This Week

In Jenkins OpenID Connect Provider Plugin 96.vee8ed882ec4d and earlier the generation of build ID Tokens uses potentially overridden values of environment variables, in conjunction with certain other. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Openid Connect Provider
NVD
CVE-2025-32755
EPSS 0% CVSS 9.1
CRITICAL Act Now

In jenkins/ssh-slave Docker images based on Debian, SSH host keys are generated on image creation for images based on Debian, causing all containers based on images of the same version use the same. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Docker Jenkins +2
NVD
CVE-2025-32754
EPSS 0% CVSS 9.1
CRITICAL Act Now

In jenkins/ssh-agent Docker images 6.11.1 and earlier, SSH host keys are generated on image creation for images based on Debian, causing all containers based on images of the same version use the. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Docker Jenkins +2
NVD
CVE-2025-31728
EPSS 0% CVSS 5.5
MEDIUM This Month

Jenkins AsakusaSatellite Plugin 0.1.1 and earlier does not mask AsakusaSatellite API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jenkins Asakusasatellite
NVD
CVE-2025-31727
EPSS 0% CVSS 5.5
MEDIUM This Month

Jenkins AsakusaSatellite Plugin 0.1.1 and earlier stores AsakusaSatellite API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jenkins Asakusasatellite
NVD
CVE-2025-31726
EPSS 0% CVSS 5.5
MEDIUM This Month

Jenkins Stack Hammer Plugin 1.0.6 and earlier stores Stack Hammer API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Stack Hammer
NVD
CVE-2025-31725
EPSS 0% CVSS 5.5
MEDIUM This Month

Jenkins monitor-remote-job Plugin 1.0 stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Monitor Remote Job
NVD
CVE-2025-31724
EPSS 1% CVSS 4.3
MEDIUM PATCH This Month

Jenkins Cadence vManager Plugin 4.0.0-282.v5096a_c2db_275 and earlier stores Verisium Manager vAPI keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jenkins Cadence Vmanager
NVD
CVE-2025-31723
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

A cross-site request forgery (CSRF) vulnerability in Jenkins Simple Queue Plugin 1.4.6 and earlier allows attackers to change and reset the build queue order. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

CSRF Jenkins Simple Queue
NVD
CVE-2025-31722
EPSS 1% CVSS 8.8
HIGH PATCH This Week

In Jenkins Templating Engine Plugin 2.5.3 and earlier, libraries defined in folders are not subject to sandbox protection, allowing attackers with Item/Configure permission to execute arbitrary code. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

RCE Code Injection Jenkins +1
NVD
CVE-2025-31721
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Configure permission to copy an agent, gaining. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Redhat
NVD
CVE-2025-31720
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Extended Read permission to copy an agent,. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Redhat
NVD
CVE-2025-30197
EPSS 0% CVSS 3.1
LOW PATCH Monitor

Jenkins Zoho QEngine Plugin 1.0.29.vfa_cc23396502 and earlier does not mask the QEngine API Key form field, increasing the potential for attackers to observe and capture it. Rated low severity (CVSS 3.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Information Disclosure Jenkins Zoho Qengine
NVD
CVE-2025-30196
EPSS 0% CVSS 6.5
MEDIUM This Month

Jenkins AnchorChain Plugin 1.0 does not limit URL schemes for links it creates based on workspace content, allowing the `javascript:` scheme, resulting in a stored cross-site scripting (XSS). Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

XSS Jenkins Anchorchain
NVD
CVE-2025-27625
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash (`\`) characters are considered safe, allowing attackers to perform phishing attacks by having users go to a. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Open Redirect Jenkins Redhat
NVD
CVE-2025-27624
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

A cross-site request forgery (CSRF) vulnerability in Jenkins 2.499 and earlier, LTS 2.492.1 and earlier allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

CSRF Jenkins Redhat
NVD
CVE-2025-27623
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of views via REST API or CLI, allowing attackers with View/Read permission. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jenkins Redhat
NVD
CVE-2025-27622
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of agents via REST API or CLI, allowing attackers with Agent/Extended Read. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jenkins Redhat
NVD
CVE-2025-0148
EPSS 0% CVSS 2.6
LOW PATCH Monitor

Missing password field masking in the Zoom Jenkins Marketplace plugin before version 1.6 may allow an unauthenticated user to conduct a disclosure of information via adjacent network access. Rated low severity (CVSS 2.6), this vulnerability is no authentication required. No vendor patch available.

Information Disclosure Jenkins
NVD
CVE-2025-0142
EPSS 0% CVSS 4.3
MEDIUM PATCH Monitor

Cleartext storage of sensitive information in the Zoom Jenkins Marketplace plugin before version 1.4 may allow an authenticated user to conduct a disclosure of information via network access. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jenkins
NVD
CVE-2025-24403
EPSS 1% CVSS 4.3
MEDIUM Monitor

A missing permission check in Jenkins Azure Service Fabric Plugin 1.6 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of Azure credentials stored in Jenkins. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Microsoft Authentication Bypass Jenkins +1
NVD
CVE-2025-24402
EPSS 1% CVSS 4.3
MEDIUM Monitor

A cross-site request forgery (CSRF) vulnerability in Jenkins Azure Service Fabric Plugin 1.6 and earlier allows attackers to connect to a Service Fabric URL using attacker-specified credentials IDs. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Microsoft CSRF Jenkins +1
NVD
CVE-2025-24401
EPSS 0% CVSS 6.8
MEDIUM This Month

Jenkins Folder-based Authorization Strategy Plugin 217.vd5b_18537403e and earlier does not verify that permissions configured to be granted are enabled, potentially allowing users formerly granted. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Folder Based Authorization Strategy
NVD
CVE-2025-24400
EPSS 0% CVSS 4.3
MEDIUM PATCH Monitor

Jenkins Eiffel Broadcaster Plugin 2.8.0 through 2.10.2 (both inclusive) uses the credential ID as the cache key during signing operations, allowing attackers able to create a credential with the same. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Jenkins Eiffel Broadcaster
NVD
CVE-2025-24399
EPSS 0% CVSS 8.8
HIGH PATCH This Month

Jenkins OpenId Connect Authentication Plugin 4.452.v2849b_d3945fa_ and earlier, except 4.438.440.v3f5f201de5dc, treats usernames as case-insensitive, allowing attackers on Jenkins instances. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Privilege Escalation Jenkins Openid Connect Authentication
NVD
CVE-2025-24398
EPSS 0% CVSS 8.8
HIGH PATCH This Month

Jenkins Bitbucket Server Integration Plugin 2.1.0 through 4.1.3 (both inclusive) allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

CSRF Jenkins Bitbucket Server Integration
NVD
CVE-2025-24397
EPSS 1% CVSS 4.3
MEDIUM PATCH Monitor

An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Gitlab Jenkins
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy