Jenkins View Encryption Bypass

MEDIUM (4.3) No Patch (4 days)

Threat Intelligence

Low Risk
EPSS Score: 0.03% chance of exploitation (percentile: 6%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

Jenkins is a popular open-source automation server for building, testing, and deploying software projects. This vulnerability allows attackers with limited permissions to access encrypted password values in views, potentially leading to unauthorized access to sensitive information.

Am I affected?

You're affected if you use A missing permission check. Affected versions: 2.528.2, 2.540 If you don't recognise this software, you're probably not affected.

Affected Products

Jenkins Software Foundation / Jenkins

How to fix

  1. Upgrade to Jenkins 2.540.1 or later (LTS 2.528.3 or later): https://jenkins.io/download/
  2. Immediate mitigations:
  3. Restrict network access to your Jenkins instance (firewall it from the public internet)
  4. Audit admin account activity for suspicious access patterns
  5. Monitor for unauthorized token creation

References