VYPR
Moderate severityNVD Advisory· Published Oct 29, 2025· Updated Nov 4, 2025

CVE-2025-64149

CVE-2025-64149

Description

A cross-site request forgery (CSRF) vulnerability in Jenkins Publish to Bitbucket Plugin 0.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in Jenkins Publish to Bitbucket Plugin 0.4 and earlier allows attackers to capture stored credentials by tricking an authenticated user into sending them to an attacker-controlled URL.

A cross-site request forgery (CSRF) vulnerability exists in the Jenkins Publish to Bitbucket Plugin versions 0.4 and earlier. The plugin fails to require POST requests or implement CSRF protection tokens for certain endpoints, allowing an attacker to forge a request that causes the plugin to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method [1][3].

To exploit this vulnerability, an attacker must first obtain a valid credentials ID stored in Jenkins (e.g., via a separate information disclosure flaw) and then trick a Jenkins user with sufficient permissions into clicking a crafted link or submitting a malicious form. The plugin will then send the associated credentials to the attacker-controlled URL, effectively capturing them [2][3].

The impact is severe: an attacker can steal credentials stored in Jenkins, potentially gaining access to other systems and services that those credentials protect. This could lead to further compromise within the organization's infrastructure [1][2].

As of the advisory publication on October 29, 2025, the vulnerability remains unpatched; no fixed version of the plugin has been released. Users are advised to disable the plugin if not essential, monitor for updates from Jenkins, and apply workarounds such as restricting access to the plugin's functionality or using Jenkins' built-in CSRF protection mechanisms [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.plugins:publish-to-bitbucketMaven
<= 0.4

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1