Loading HuntDB...

CVE-2025-53652

HIGH
Published 2025-07-09T15:39:27.816Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-53652. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
8.2
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
LOW
Availability
NONE

Description

Jenkins Git Parameter Plugin 439.vb_0e46ca_14534 and earlier does not validate that the Git parameter value submitted to the build matches one of the offered choices, allowing attackers with Item/Build permission to inject arbitrary values into Git parameters.

Available Exploits

No exploits available for this CVE.

Related News

15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652)

A new report by VulnCheck exposes a critical command injection flaw (CVE-2025-53652) in the Jenkins Git Parameter plugin.…

HackRead 2025-08-08 19:14

Affected Products

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

Jenkins Git Parameter Plugin 439.vb_0e46ca_14534 and earlier does not validate that the Git parameter value submitted to the build matches one of the offered choices, allowing attackers with Item/Build permission to inject arbitrary values into Git parameters.

Affected Products (ENISA)

jenkins project
jenkins git parameter plugin

ENISA Scoring

CVSS Score (3.1)

8.2
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

EPSS Score

0.050
probability

Data provided by ENISA EU Vulnerability Database. Last updated: July 9, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed MODERATE

Jenkins Git Parameter Plugin vulnerable to code injection due to inexhaustive parameter check

GHSA-qcj2-99cg-mppf

Advisory Details

Jenkins Git Parameter Plugin implements a choice build parameter that lists the configured Git SCM’s branches, tags, pull requests, and revisions. Git Parameter Plugin 439.vb_0e46ca_14534 and earlier does not validate that the Git parameter value submitted to the build matches one of the offered choices. This allows attackers with Item/Build permission to inject arbitrary values into Git parameters. Git Parameter Plugin 444.vca_b_84d3703c2 validates that the Git parameter value submitted to the build matches one of the offered choices.

Affected Packages

Maven org.jenkins-ci.tools:git-parameter
ECOSYSTEM: ≥0 <444.vca

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Advisory provided by GitHub Security Advisory Database. Published: July 9, 2025, Modified: July 9, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

7 posts
Reddit 1 week, 3 days ago
lubyruffy

Command Injection in Jenkins via Git Parameter (CVE-2025-53652) | Blog | VulnCheck

Reddit 1 week, 3 days ago
lubyruffy

15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652)

Reddit 1 week, 4 days ago
crstux
Exploit

🔥 Top 10 Trending CVEs (12/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-32724](https://nvd.nist.gov/vuln/detail/CVE-2025-32724)** - 📝 Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability - 📅 **Published:** 10/06/2025 - 📈 **CVSS:** 7.5 - 🧭 **Vector:** CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C - 📣 **Mentions:** 4 - ⚠️ …

1
1.0
View Original High Risk
Reddit 1 week, 5 days ago
crstux
Exploit

🔥 Top 10 Trending CVEs (11/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-49760](https://nvd.nist.gov/vuln/detail/CVE-2025-49760)** - 📝 Windows Storage Spoofing Vulnerability - 📅 **Published:** 08/07/2025 - 📈 **CVSS:** 3.5 - 🧭 **Vector:** CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C - 📣 **Mentions:** 4 - ⚠️ **Priority:** 4 - 📝 **Analysis:** A …

2
2.0
View Original High Risk
Reddit 1 week, 6 days ago
crstux
Exploit

🔥 Top 10 Trending CVEs (10/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-8088](https://nvd.nist.gov/vuln/detail/CVE-2025-8088)** - 📝 A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the …

3
1
5.0
View Original High Risk
Reddit 2 weeks ago
jamessonnycrockett

15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652)

Reddit 2 weeks, 1 day ago
lubyruffy

Command Injection in Jenkins via Git Parameter (CVE-2025-53652) | Blog | VulnCheck

References

Published: 2025-07-09T15:39:27.816Z
Last Modified: 2025-07-09T19:15:43.166Z
Copied to clipboard!