Skip to content

Commit c837237

Browse files

File tree

6 files changed

+183
-108
lines changed

6 files changed

+183
-108
lines changed
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-23vj-j6jc-w892",
4+
"modified": "2025-10-29T21:52:21Z",
5+
"published": "2025-10-29T15:31:56Z",
6+
"aliases": [
7+
"CVE-2025-64146"
8+
],
9+
"summary": "Jenkins Curseforge Publisher Plugin stores API Keys unencrypted in job config.xml files",
10+
"details": "Jenkins Curseforge Publisher Plugin 1.0 and earlier stores API Keys unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration.\n\nThese keys can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.\n\nAdditionally, the job configuration form does not mask these keys, increasing the potential for attackers to observe and capture them.\n\nAs of publication of this advisory, there is no fix.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.jenkins-ci.plugins:curseforge-publisher"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "1.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64146"
42+
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/jenkinsci/curseforge-publisher-plugin"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://www.jenkins.io/security/advisory/2025-10-29/#SECURITY-3562"
50+
}
51+
],
52+
"database_specific": {
53+
"cwe_ids": [
54+
"CWE-311"
55+
],
56+
"severity": "MODERATE",
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2025-10-29T21:52:21Z",
59+
"nvd_published_at": "2025-10-29T14:15:59Z"
60+
}
61+
}
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3jw2-5hjg-hc2c",
4+
"modified": "2025-10-29T21:49:59Z",
5+
"published": "2025-10-29T15:31:56Z",
6+
"aliases": [
7+
"CVE-2025-64133"
8+
],
9+
"summary": "Jenkins Extensible Choice Parameter Plugin vulnerable to cross-site request forgery",
10+
"details": "Jenkins Extensible Choice Parameter Plugin 239.v5f5c278708cf and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.\n\nThis vulnerability allows attackers to execute sandboxed Groovy code.\n\nAs of publication of this advisory, there is no fix.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "jp.ikedam.jenkins.plugins:extensible-choice-parameter"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "239.v5f5c278708cf"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64133"
42+
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/jenkinsci/extensible-choice-parameter-plugin"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://www.jenkins.io/security/advisory/2025-10-29/#SECURITY-3583"
50+
}
51+
],
52+
"database_specific": {
53+
"cwe_ids": [
54+
"CWE-352"
55+
],
56+
"severity": "MODERATE",
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2025-10-29T21:49:59Z",
59+
"nvd_published_at": "2025-10-29T14:15:57Z"
60+
}
61+
}
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6mgr-3374-4p3c",
4+
"modified": "2025-10-29T21:51:50Z",
5+
"published": "2025-10-29T15:31:56Z",
6+
"aliases": [
7+
"CVE-2025-64138"
8+
],
9+
"summary": "Jenkins Start Windocks Containers Plugin vulnerable to cross-site request forgery",
10+
"details": "Jenkins Start Windocks Containers Plugin 1.4 and earlier does not perform a permission check in an HTTP endpoint.\n\nThis allows attackers with Overall/Read permission to connect to an attacker-specified URL.\n\nAdditionally, this endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.\n\nAs of publication of this advisory, there is no fix.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.jenkins-ci.plugins:windocks-start-container"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "1.4"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64138"
42+
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/jenkinsci/windocks-start-container-plugin"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://www.jenkins.io/security/advisory/2025-10-29/#SECURITY-3531"
50+
}
51+
],
52+
"database_specific": {
53+
"cwe_ids": [
54+
"CWE-352"
55+
],
56+
"severity": "MODERATE",
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2025-10-29T21:51:50Z",
59+
"nvd_published_at": "2025-10-29T14:15:58Z"
60+
}
61+
}

advisories/unreviewed/2025/10/GHSA-23vj-j6jc-w892/GHSA-23vj-j6jc-w892.json

Lines changed: 0 additions & 36 deletions
This file was deleted.

advisories/unreviewed/2025/10/GHSA-3jw2-5hjg-hc2c/GHSA-3jw2-5hjg-hc2c.json

Lines changed: 0 additions & 36 deletions
This file was deleted.

advisories/unreviewed/2025/10/GHSA-6mgr-3374-4p3c/GHSA-6mgr-3374-4p3c.json

Lines changed: 0 additions & 36 deletions
This file was deleted.

0 commit comments

Comments
 (0)