GHSA-57ww-2cvr-wv38
GitHub Security Advisory
Jenkins Job Import Plugin vulnerable to exposure of sensitive information
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins Job Import Plugin did not check user permissions on its API endpoint used to access remote Jenkins instances. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Job Import Plugin 3.0 will only access Jenkins instances using credentials defined in the global configuration.
Affected Packages
Maven
org.jenkins-ci.plugins:job-import-plugin
Affected versions:
0
(fixed in 3.0)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: July 1, 2025 6:26 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.