Multiple Jenkins Plugin Vulnerabilities Expose Sensitive Data

Jenkins, the widely used open-source automation server, issued a high-priority security advisory (2025-04-02) addressing eight vulnerabilities across its core platform and seven plugins.

The most severe flaw, CVE-2025-31722, enables arbitrary code execution on Jenkins controllers via the Templating Engine Plugin, earning a CVSSv3 score of 8.8.

The advisory also reveals systemic issues with permission management and insecure credential storage affecting millions of DevOps pipelines globally.

Critical Code Injection in Templating Engine Plugin

CVE-2025-31722 (CVSS 8.8) exposes Jenkins controllers to remote code execution through folder-scoped pipeline libraries.

Attackers with Item/Configure permissions can bypass Groovy sandbox protections in Templating Engine Plugin versions ≤2.5.3, executing malicious code directly on the controller JVM.

Patched in v2.5.4, this vulnerability highlights risks in improperly scoped CI/CD component trust models.

Core Jenkins Permission Bypasses

Two medium-severity flaws (CVE-2025-31720/CVE-2025-31721) in Jenkins core versions ≤2.503/LTS ≤2.492.2 allow privilege escalation:

  • Agent Configuration Leak: Attackers with Computer/Create permissions gain unauthorized access to agent configurations.
  • Secret Extraction: Similar bypass exposes encrypted secrets stored in agent configurations.

Patched versions (Jenkins 2.504/LTS 2.492.3) enforce Computer/Extended Read and Computer/Configure permissions, respectively.

Plug-in Security Failures

Insecure Credential Storage

PluginCVERisk Profile
Cadence vManagerCVE-2025-31724Unencrypted Verisium API keys
monitor-remote-jobCVE-2025-31725Plaintext passwords
Stack HammerCVE-2025-31726Exposed API keys
AsakusaSatelliteCVE-2025-31727/31728Unmasked API keys

These plugins store sensitive data unencrypted in config.xml files, accessible via Item/Extended Read permissions or filesystem access.

Only Cadence vManager (v4.0.1) provides encryption fixes; others remain unpatched.

CSRF in Build Queue Manipulation

CVE-2025-31723 affects Simple Queue Plugin ≤1.4.6, allowing attackers to alter build orders via cross-site requests.

Version 1.4.7 mandates POST requests for critical endpoints.


Remediation Timeline and Challenges

Patched Components:

  • Jenkins Core: Upgrade to 2.504 (weekly) or 2.492.3 (LTS)
  • Templating Engine: v2.5.4
  • Simple Queue Plugin: v1.4.7
  • Cadence vManager: v4.0.1

Unresolved Risks:
Plugins without fixes (AsakusaSatellite, monitor-remote-job, Stack Hammer) require compensating controls:

  1. Revoke Item/Extended Read from untrusted users
  2. Audit config.xml files for exposed credentials
  3. Monitor plugin repositories for updates.

Attribution and Response

CloudBees researchers Daniel Beck and Swapna Nanda identified core permission flaws, while Aix Marseille University teams disclosed multiple plugin vulnerabilities.

The Jenkins project emphasizes immediate patching for the Templating Engine and core systems, noting no active exploits observed as of advisory publication.

Administrators must balance plugin dependency risks against pipeline functionality, particularly for unmaintained components.

Continuous secrets rotation and least-privilege access remain critical defenses as CI/CD infrastructures face escalating attack surfaces.

Also Read:

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here