Cleartext Storage of Sensitive Information Affecting org.jenkins-ci.main:jenkins-core package, versions [,2.528.3)[2.529,2.541)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cleartext Storage of Sensitive Information vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGJENKINSCIMAIN-14378450
  • published12 Dec 2025
  • disclosed10 Dec 2025
  • creditJames Nord

Introduced: 10 Dec 2025

NewCVE-2025-67637  (opens in a new tab)
CWE-312  (opens in a new tab)

How to fix?

Upgrade org.jenkins-ci.main:jenkins-core to version 2.528.3, 2.541 or higher.

Overview

org.jenkins-ci.main:jenkins-core is an open source automation server.

Affected versions of this package are vulnerable to Cleartext Storage of Sensitive Information in the storage of build authorization tokens in plain text within config.xml files. An attacker can gain unauthorized access to sensitive information by obtaining Item/Extended Read permissions or direct access to the controller file system.

CVSS Base Scores

version 4.0
version 3.1