Exposure of Encrypted Secrets in Jenkins by CloudBees
CVE-2025-27623

4.3MEDIUM

Key Information:

Vendor
Jenkins
Status
Vendor
CVE Published:
5 March 2025

Summary

In Jenkins versions 2.499 and earlier, including LTS version 2.492.1, a vulnerability exists whereby encrypted values of secrets can be accessed through the 'config.xml' of views via the REST API or CLI. This flaw permits attackers with View/Read permissions to retrieve sensitive encrypted information, potentially leading to unauthorized exposure of critical secrets used within the Jenkins environment.

Affected Version(s)

Jenkins 2.492.2

Jenkins 2.492.2 < 2.492.*

Jenkins 2.500

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.