Jenkins JDepend Plugin 1.3.1 and earlier includes an outdated version of JDepend Maven Plugin that does not configure its XML parser to prevent XML external entity (XXE) attacks.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jfg6-4gx3-3v7w Jenkins JDepend Plugin vulnerable to XML external entity attacks
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 30 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins
Jenkins jenkins
Vendors & Products Jenkins
Jenkins jenkins

Thu, 30 Oct 2025 09:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 29 Oct 2025 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-611
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}


Wed, 29 Oct 2025 13:45:00 +0000

Type Values Removed Values Added
Description Jenkins JDepend Plugin 1.3.1 and earlier includes an outdated version of JDepend Maven Plugin that does not configure its XML parser to prevent XML external entity (XXE) attacks.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-10-29T14:08:30.966Z

Reserved: 2025-10-28T07:34:37.541Z

Link: CVE-2025-64134

cve-icon Vulnrichment

Updated: 2025-10-29T14:08:14.183Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-29T14:15:57.613

Modified: 2025-10-30T15:03:13.440

Link: CVE-2025-64134

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-30T14:38:38Z