CVE-2025-67637

4.3 MEDIUM

📋 TL;DR

Jenkins versions 2.540 and earlier (including LTS 2.528.2 and earlier) store build authorization tokens unencrypted in job configuration files. This allows users with Item/Extended Read permission or filesystem access to view these tokens, potentially enabling unauthorized build triggering or job manipulation.

💻 Affected Systems

Products:
  • Jenkins
Versions: Jenkins 2.540 and earlier, Jenkins LTS 2.528.2 and earlier
Operating Systems: All operating systems running affected Jenkins versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Jenkins controllers where users have Item/Extended Read permission or filesystem access to config.xml files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with appropriate permissions could steal build tokens to trigger unauthorized builds, modify job configurations, or escalate privileges within the Jenkins environment.

🟠

Likely Case

Internal users with Item/Extended Read permission could view and misuse build tokens to trigger builds they shouldn't have access to, potentially exposing sensitive build artifacts or credentials.

🟢

If Mitigated

With strict permission controls and filesystem access restrictions, the impact is limited to authorized users who already have significant Jenkins access.

🌐 Internet-Facing: LOW - This vulnerability requires existing Jenkins user permissions or filesystem access, making direct internet exploitation unlikely.
🏢 Internal Only: MEDIUM - Internal users with Item/Extended Read permission can exploit this without additional authentication, posing a significant insider threat risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple file read or permission abuse required

Exploitation requires existing Jenkins permissions or filesystem access; no authentication bypass needed for authorized users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Jenkins 2.541, Jenkins LTS 2.528.3

Vendor Advisory: https://www.jenkins.io/security/advisory/2025-12-10/#SECURITY-783

Restart Required: Yes

Instructions:

1. Backup Jenkins configuration and data. 2. Upgrade Jenkins to version 2.541 or later (or LTS 2.528.3 or later). 3. Restart Jenkins service. 4. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Restrict Item/Extended Read Permissions

all

Limit users with Item/Extended Read permission to only trusted administrators to reduce exposure.

Navigate to Jenkins > Manage Jenkins > Configure Global Security > Authorization

Secure Jenkins Controller Filesystem

linux

Restrict filesystem access to Jenkins controller directories containing config.xml files.

chmod 600 /var/lib/jenkins/jobs/*/config.xml
chown jenkins:jenkins /var/lib/jenkins/jobs/*/config.xml

🧯 If You Can't Patch

  • Review and restrict Item/Extended Read permissions to minimal necessary users
  • Implement strict filesystem access controls on Jenkins controller directories

🔍 How to Verify

Check if Vulnerable:

Check Jenkins version via Manage Jenkins > About Jenkins or run: java -jar jenkins.war --version

Check Version:

java -jar jenkins.war --version

Verify Fix Applied:

Verify Jenkins version is 2.541 or later (or LTS 2.528.3 or later) and check that config.xml files no longer contain plaintext build tokens

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized build triggers from unexpected users
  • Multiple failed build attempts with stolen tokens

Network Indicators:

  • Unusual build trigger patterns or timing

SIEM Query:

source="jenkins" AND (event="BUILD_TRIGGERED" AND user NOT IN [authorized_users])

🔗 References

📤 Share & Export