First published: Wed Mar 05 2025(Updated: )
Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of agents via REST API or CLI, allowing attackers with Agent/Extended Read permission to view encrypted values of secrets.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins LTS | <2.499 | |
Jenkins | <2.492.1 | |
maven/org.jenkins-ci.main:jenkins-core | <2.492.2 | 2.492.2 |
maven/org.jenkins-ci.main:jenkins-core | >=2.493<2.500 | 2.500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27622 has a high severity rating due to its potential for unauthorized access to sensitive encrypted values.
CVE-2025-27622 affects Jenkins versions 2.499 and earlier, as well as LTS 2.492.1 and earlier.
To fix CVE-2025-27622, upgrade Jenkins to version 2.500 or later, or LTS 2.493 or later.
Attackers with Agent or Extended Read permission can exploit CVE-2025-27622 to view encrypted values of secrets.
CVE-2025-27622 highlights that Jenkins does not redact encrypted values of secrets in the config.xml file accessible via REST API or CLI.