← Back to CVEs
CVE-2025-58458
MEDIUM4.3
Description
In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
CVE Details
CVSS v3.1 Score4.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published9/3/2025
Last Modified11/4/2025
Sourcenvd
Honeypot Sightings0
Affected Products
jenkins:git_client
Weaknesses (CWE)
CWE-200CWE-538
References
https://www.jenkins.io/security/advisory/2025-09-03/#SECURITY-3590(jenkinsci-cert@googlegroups.com)
http://www.openwall.com/lists/oss-security/2025/09/03/4(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.