VYPR
Moderate severityNVD Advisory· Published Oct 29, 2025· Updated Nov 4, 2025

CVE-2025-64145

CVE-2025-64145

Description

Jenkins ByteGuard Build Actions Plugin 1.0 does not mask API tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Jenkins ByteGuard Build Actions Plugin 1.0 does not mask API tokens on the job configuration form, allowing attackers with job configuration access to capture them.

Vulnerability

Description

The Jenkins ByteGuard Build Actions Plugin version 1.0 fails to mask API tokens when displayed on the job configuration form [1][3]. This means that sensitive credential values are shown in plain text rather than being obfuscated (e.g., with asterisks), increasing the likelihood that an attacker who can view the configuration page can capture the token.

Attack

Vector

To exploit this vulnerability, an attacker must have at least Job/Configure permission for a Jenkins job that uses the ByteGuard Build Actions Plugin, as the token is revealed on the job configuration form [1][2]. No special network position is required beyond access to the Jenkins web interface; the configuration form is part of the standard UI. The vulnerability is present in all known versions of the plugin, which remains unpatched as of the advisory date [1][2].

Impact

An attacker who can observe or capture the plaintext API token can use it to authenticate to external services or perform actions on behalf of the Jenkins instance, depending on the scope of the token. The lack of masking directly reduces the security posture of the credential, making it easier to leak through shoulder surfing, session recording, or other monitoring of the configuration page [1][3].

Mitigation

Status

As of the Jenkins Security Advisory dated 2025-10-29, there is no fix available for the ByteGuard Build Actions Plugin; the plugin is listed among those with unresolved security issues [2]. Users are strongly advised to avoid using the plugin in sensitive environments, restrict access to job configuration pages, and consider alternative plugins or workflow patterns that properly mask credentials.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
io.jenkins.plugins:byteguard-build-actionsMaven
<= 1.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1