VYPR
Moderate severityNVD Advisory· Published Sep 17, 2025· Updated Nov 4, 2025

CVE-2025-59475

CVE-2025-59475

Description

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check for the authenticated user profile dropdown menu, allowing attackers without Overall/Read permission to obtain limited information about the Jenkins configuration by listing available options in this menu (e.g., whether Credentials Plugin is installed).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not check permissions in user profile dropdown, allowing attackers without Overall/Read to infer configuration details (e.g., installed plugins).

Vulnerability

Description Jenkins 2.527 and earlier, and LTS 2.516.2 and earlier, contains a missing permission check in the authenticated user profile dropdown menu [1][2]. This flaw allows attackers without the Overall/Read permission to list available options in the menu, such as whether the Credentials Plugin is installed, thereby leaking limited configuration information.

Exploitation

An attacker must have a valid Jenkins user account but lack Overall/Read permission. By accessing the profile dropdown, they can observe menu items that reveal the presence or absence of certain plugins and features [2]. No additional privileges are required beyond authentication.

Impact

Exploitation allows an attacker to gather intelligence about the Jenkins instance, such as installed plugins, which could be used to plan further attacks targeting specific plugin vulnerabilities [1]. The information disclosure is limited but helps attackers tailor their approach.

Mitigation

The issue is fixed in Jenkins 2.528 and Jenkins LTS 2.516.3 [2][3]. Users running affected versions should upgrade to these releases or later. No workarounds have been provided.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.main:jenkins-coreMaven
< 2.516.32.516.3
org.jenkins-ci.main:jenkins-coreMaven
>= 2.517, < 2.5282.528

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1