Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-26516 | In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. |
![]() |
GHSA-g2pq-9jr7-w6gv | Jenkins Git client Plugin file system information disclosure vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 08 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jenkins git Client
|
|
CPEs | cpe:2.3:a:jenkins:git_client:*:*:*:*:*:jenkins:*:* cpe:2.3:a:jenkins:git_client:6.2.0:*:*:*:*:jenkins:*:* |
|
Vendors & Products |
Jenkins git Client
|
Thu, 04 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Jenkins Git client Plugin 6.3.2 and earlier, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. |
Wed, 03 Sep 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jenkins
Jenkins git Client Plugin |
|
Vendors & Products |
Jenkins
Jenkins git Client Plugin |
Wed, 03 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 CWE-538 |
|
Metrics |
cvssV3_1
|
Wed, 03 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Jenkins Git client Plugin 6.3.2 and earlier, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | |
References |
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-09-05T07:08:01.133Z
Reserved: 2025-09-02T12:44:16.983Z
Link: CVE-2025-58458

Updated: 2025-09-03T15:40:08.054Z

Status : Analyzed
Published: 2025-09-03T15:15:39.520
Modified: 2025-09-08T17:14:19.823
Link: CVE-2025-58458

No data.

Updated: 2025-09-03T20:26:54Z