First published: Wed Mar 05 2025(Updated: )
Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of views via REST API or CLI, allowing attackers with View/Read permission to view encrypted values of secrets.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins LTS | <2.500 | |
Jenkins | <2.492.1 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.493<2.500 | 2.500 |
maven/org.jenkins-ci.main:jenkins-core | <2.492.2 | 2.492.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27623 has been rated as a high severity vulnerability given its potential for unauthorized access to sensitive information.
To fix CVE-2025-27623, upgrade Jenkins to version 2.500 or later or Jenkins LTS to version 2.492.2 or later.
The impact of CVE-2025-27623 allows attackers with View/Read permission to access unredacted encrypted values of secrets in `config.xml`.
CVE-2025-27623 affects Jenkins versions 2.499 and earlier, as well as Jenkins LTS versions 2.492.1 and earlier.
If you cannot upgrade, consider restricting access permissions to limit who can view the affected configurations.