CVE-2025-64148
Description
A missing permission check in Jenkins Publish to Bitbucket Plugin 0.4 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing permission check in Jenkins Publish to Bitbucket Plugin 0.4 and earlier allows attackers with Overall/Read to enumerate credential IDs.
Vulnerability
The Jenkins Publish to Bitbucket Plugin versions 0.4 and earlier contain a missing permission check vulnerability. This flaw allows an attacker with only Overall/Read permission to enumerate credentials IDs stored in Jenkins. The plugin fails to verify that the user has the necessary permissions (such as Credentials/View) before exposing credential identifiers.
Exploitation
An attacker who has been granted Overall/Read permission (a relatively low privilege level) can exploit this by sending crafted requests to the plugin's endpoints. No additional authentication or special network position is required beyond having a Jenkins account with that basic permission. The attack surface is the Jenkins web interface or API endpoints exposed by the plugin.
Impact
Successful exploitation enables the attacker to enumerate credential IDs, which are unique identifiers for stored credentials. While this does not directly reveal the credential secrets (passwords, tokens, etc.), it provides information that can be used in further attacks, such as targeting specific credentials or mapping the credential store. This information disclosure could aid in more sophisticated attacks against the Jenkins instance.
Mitigation
As of the advisory date (2025-10-29), no fix has been released for the Publish to Bitbucket Plugin. The plugin is listed among those with unresolved security issues in the Jenkins Security Advisory [1][2]. Users are advised to restrict Overall/Read permission to trusted users only, or to disable the plugin if not required. The plugin's source repository [4] may be monitored for future updates.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:publish-to-bitbucketMaven | <= 0.4 | — |
Affected products
2- Range: <=0.4
- Jenkins Project/Jenkins Publish to Bitbucket Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-v549-7pm5-f8qrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-64148ghsaADVISORY
- www.jenkins.io/security/advisory/2025-10-29/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2025/10/29/2ghsaWEB
News mentions
1- Jenkins Security Advisory 2025-10-29Jenkins Security Advisories · Oct 29, 2025