Jenkins Security Advisory 2025-03-05

This advisory announces vulnerabilities in the following Jenkins deliverables:

  • Jenkins (core)

Descriptions

Encrypted values of secrets stored in agent configuration revealed to users with Agent/Extended Read permission

SECURITY-3495 / CVE-2025-27622
Severity (CVSS): Medium
Description:

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing config.xml of agents via REST API or CLI.

This allows attackers with Agent/Extended Read permission to view encrypted values of secrets.

Jenkins 2.500, LTS 2.492.2 redacts the encrypted values of secrets stored in agent config.xml accessed via REST API or CLI for users lacking Agent/Configure permission.

Encrypted values of secrets stored in view configuration revealed to users with View/Read permission

SECURITY-3496 / CVE-2025-27623
Severity (CVSS): Medium
Description:

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing config.xml of views via REST API or CLI.

This allows attackers with View/Read permission to view encrypted values of secrets.

Jenkins 2.500, LTS 2.492.2 redacts the encrypted values of secrets stored in view config.xml accessed via REST API or CLI for users lacking View/Configure permission.

CSRF vulnerability

SECURITY-3498 / CVE-2025-27624
Severity (CVSS): Medium
Description:

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not require POST requests for the HTTP endpoint toggling collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets), resulting in a cross-site request forgery (CSRF) vulnerability.

This vulnerability allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets.

Additionally, as the API accepts any string as the identifier of the panel ID to be toggled, attacker-controlled content can be stored in the victim’s user profile in Jenkins.

Jenkins 2.500, LTS 2.492.2 requires POST requests for the affected HTTP endpoint.

Open redirect vulnerability

SECURITY-3501 / CVE-2025-27625
Severity (CVSS): Medium
Description:

Various features in Jenkins redirect users to partially user-controlled URLs inside Jenkins. To prevent open redirect vulnerabilities, Jenkins limits redirections to safe URLs (neither absolute nor scheme-relative/network-path reference).

In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash (\) characters are considered safe.

This allows attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site, because browsers interpret these characters as part of scheme-relative redirects.

Jenkins 2.500, LTS 2.492.2 considers redirects to URLs starting with backslash (\) characters to be unsafe, rejecting such redirects.

Severity

Affected Versions

  • Jenkins weekly up to and including 2.499
  • Jenkins LTS up to and including 2.492.1

Fix

  • Jenkins weekly should be updated to version 2.500
  • Jenkins LTS should be updated to version 2.492.2

These versions include fixes to the vulnerabilities described above. All prior versions are considered to be affected by these vulnerabilities unless otherwise indicated.

Credit

The Jenkins project would like to thank the reporters for discovering and reporting these vulnerabilities:

  • Antoine Ruffino, CloudBees, Inc. for SECURITY-3498
  • Daniel Beck, CloudBees, Inc. for SECURITY-3495, SECURITY-3496
  • XBOW for SECURITY-3501