Exposure of Encrypted Secrets in Jenkins by CloudBees
CVE-2025-27623
4.3MEDIUM
Summary
In Jenkins versions 2.499 and earlier, including LTS version 2.492.1, a vulnerability exists whereby encrypted values of secrets can be accessed through the 'config.xml' of views via the REST API or CLI. This flaw permits attackers with View/Read permissions to retrieve sensitive encrypted information, potentially leading to unauthorized exposure of critical secrets used within the Jenkins environment.
Affected Version(s)
Jenkins 2.492.2
Jenkins 2.492.2 < 2.492.*
Jenkins 2.500
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved