Permission Check Flaw in Jenkins MCP Server Plugin by Jenkins
CVE-2025-64132

5.4MEDIUM

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
29 October 2025

What is CVE-2025-64132?

CVE-2025-64132 is a vulnerability found within the Jenkins MCP Server Plugin, a component of the Jenkins automation server widely utilized for continuous integration and continuous delivery (CI/CD) tasks. This particular flaw arises from insufficient permission checks, allowing malicious actors to trigger builds and access sensitive information related to job and cloud configurations that they would normallly be restricted from seeing. The lack of proper authorization could lead to unauthorized access to critical operational data, making it a potential risk for organizations relying on Jenkins for their development and deployment processes.

The vulnerability is present in versions of the MCP Server Plugin up to 0.84.v50ca_24ef83f2. Since Jenkins is a foundational tool in many development environments, the exploitation of this vulnerability could have far-reaching consequences, affecting not only the security of configurations but also the integrity of the CI/CD pipelines managed by affected organizations.

Potential impact of CVE-2025-64132

  1. Unauthorized Access to Sensitive Data: Attackers could leverage this vulnerability to view confidential configuration information and operational data, potentially including sensitive credentials and deployment settings that could compromise project security.

  2. Interference with Build Processes: The ability to trigger builds without authorization may allow malicious actors to introduce harmful changes to software projects, leading to production issues, potential service outages, and compromised software integrity.

  3. Increased Attack Surface: By exploiting this vulnerability, attackers may gain insight into the infrastructure and configurations of the Jenkins environment. This information can be used to orchestrate further attacks or to exploit additional vulnerabilities within the system.

Affected Version(s)

Jenkins MCP Server Plugin 0 <= 0.84.v50ca_24ef83f2

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-64132 : Permission Check Flaw in Jenkins MCP Server Plugin by Jenkins