CVE-2025-59475
Description
Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check for the authenticated user profile dropdown menu, allowing attackers without Overall/Read permission to obtain limited information about the Jenkins configuration by listing available options in this menu (e.g., whether Credentials Plugin is installed).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not check permissions in user profile dropdown, allowing attackers without Overall/Read to infer configuration details (e.g., installed plugins).
Vulnerability
Description Jenkins 2.527 and earlier, and LTS 2.516.2 and earlier, contains a missing permission check in the authenticated user profile dropdown menu [1][2]. This flaw allows attackers without the Overall/Read permission to list available options in the menu, such as whether the Credentials Plugin is installed, thereby leaking limited configuration information.
Exploitation
An attacker must have a valid Jenkins user account but lack Overall/Read permission. By accessing the profile dropdown, they can observe menu items that reveal the presence or absence of certain plugins and features [2]. No additional privileges are required beyond authentication.
Impact
Exploitation allows an attacker to gather intelligence about the Jenkins instance, such as installed plugins, which could be used to plan further attacks targeting specific plugin vulnerabilities [1]. The information disclosure is limited but helps attackers tailor their approach.
Mitigation
The issue is fixed in Jenkins 2.528 and Jenkins LTS 2.516.3 [2][3]. Users running affected versions should upgrade to these releases or later. No workarounds have been provided.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.main:jenkins-coreMaven | < 2.516.3 | 2.516.3 |
org.jenkins-ci.main:jenkins-coreMaven | >= 2.517, < 2.528 | 2.528 |
Affected products
2- Range: <=2.527 / <=2.516.2
- Jenkins Project/Jenkinsv5Range: 2.516.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-223m-4rfp-646hghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-59475ghsaADVISORY
- www.jenkins.io/security/advisory/2025-09-17/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2025/09/17/1ghsaWEB
News mentions
1- Jenkins Security Advisory 2025-09-17Jenkins Security Advisories · Sep 17, 2025