First published: Wed Apr 02 2025(Updated: )
A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Configure permission to copy an agent, gaining access to encrypted secrets in its configuration.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins LTS | <2.503 | |
Jenkins | <2.492.2 | |
maven/org.jenkins-ci.main:jenkins-core | <2.492.3 | 2.492.3 |
maven/org.jenkins-ci.main:jenkins-core | >=2.500<2.504 | 2.504 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-31721 is classified as critical due to the potential unauthorized access to encrypted secrets.
To fix CVE-2025-31721, update your Jenkins installation to version 2.504 or later, or LTS 2.493 or later.
The potential impacts of CVE-2025-31721 include unauthorized access to sensitive data and configuration settings through compromised agents.
CVE-2025-31721 affects users of Jenkins versions 2.503 and earlier, as well as LTS versions 2.492.2 and earlier.
CVE-2025-31721 involves the Computer/Create permission which allows users to copy an agent without the necessary Computer/Configure permission.