CVE-2025-64145
Description
Jenkins ByteGuard Build Actions Plugin 1.0 does not mask API tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins ByteGuard Build Actions Plugin 1.0 does not mask API tokens on the job configuration form, allowing attackers with job configuration access to capture them.
Vulnerability
Description
The Jenkins ByteGuard Build Actions Plugin version 1.0 fails to mask API tokens when displayed on the job configuration form [1][3]. This means that sensitive credential values are shown in plain text rather than being obfuscated (e.g., with asterisks), increasing the likelihood that an attacker who can view the configuration page can capture the token.
Attack
Vector
To exploit this vulnerability, an attacker must have at least Job/Configure permission for a Jenkins job that uses the ByteGuard Build Actions Plugin, as the token is revealed on the job configuration form [1][2]. No special network position is required beyond access to the Jenkins web interface; the configuration form is part of the standard UI. The vulnerability is present in all known versions of the plugin, which remains unpatched as of the advisory date [1][2].
Impact
An attacker who can observe or capture the plaintext API token can use it to authenticate to external services or perform actions on behalf of the Jenkins instance, depending on the scope of the token. The lack of masking directly reduces the security posture of the credential, making it easier to leak through shoulder surfing, session recording, or other monitoring of the configuration page [1][3].
Mitigation
Status
As of the Jenkins Security Advisory dated 2025-10-29, there is no fix available for the ByteGuard Build Actions Plugin; the plugin is listed among those with unresolved security issues [2]. Users are strongly advised to avoid using the plugin in sensitive environments, restrict access to job configuration pages, and consider alternative plugins or workflow patterns that properly mask credentials.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.jenkins.plugins:byteguard-build-actionsMaven | <= 1.0 | — |
Affected products
2- Range: <=1.0
- Jenkins Project/Jenkins ByteGuard Build Actions Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-vmm2-53rc-43v3ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-64145ghsaADVISORY
- www.jenkins.io/security/advisory/2025-10-29/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2025/10/29/2ghsaWEB
News mentions
1- Jenkins Security Advisory 2025-10-29Jenkins Security Advisories · Oct 29, 2025