First published: Wed Apr 02 2025(Updated: )
Jenkins monitor-remote-job Plugin 1.0 stores passwords unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration. These passwords can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. As of publication of this advisory, there is no fix.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.ukiuni.monitor-remote-job-plugin:monitor-remote-job | =1.0 | |
Jenkins Monitor Remote Job | ||
Jenkins Monitor Remote Job | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-31725 is classified as a high severity vulnerability due to the potential exposure of unencrypted passwords.
To fix CVE-2025-31725, update the Jenkins monitor-remote-job Plugin to the latest version that addresses this vulnerability.
The consequences of CVE-2025-31725 include unauthorized access to sensitive information since passwords are stored unencrypted.
Users with Extended Read permission or access to the Jenkins controller file system are affected by CVE-2025-31725.
CVE-2025-31725 affects the Jenkins monitor-remote-job Plugin version 1.0, which stores passwords in job config.xml files.