CVE-2025-64150
Description
A missing permission check in Jenkins Publish to Bitbucket Plugin 0.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing permission check in Jenkins Publish to Bitbucket Plugin 0.4 and earlier allows attackers with Overall/Read to capture stored credentials via attacker-controlled URL.
Vulnerability
Overview The Jenkins Publish to Bitbucket Plugin versions 0.4 and earlier contain a missing permission check in an unspecified HTTP endpoint. This flaw allows an attacker with only Overall/Read permission (a low-privilege role) to trigger a connection to an attacker-specified URL, using credential IDs obtained through other means (e.g., credential ID enumeration or plugin vulnerabilities). The root cause is the lack of a permission check before executing the operation, as noted in the Jenkins security advisory [1].
Exploitation
Prerequisites Exploitation requires the attacker to have Overall/Read permission on the Jenkins instance and to know valid credential IDs stored in Jenkins (which could be harvested via other flaws or misconfigurations). By supplying these credential IDs along with a controlled URL, the plugin will attempt to connect to that URL using the corresponding stored credentials, effectively leaking them to the attacker [2]. No additional authentication or network position is needed beyond access to the Jenkins web UI.
Impact
A successful attack captures credentials stored in Jenkins, which may include passwords, API tokens, SSH keys, or cloud provider secrets. This can lead to lateral movement, privilege escalation, or compromise of external systems accessible with those credentials. The vulnerability is classified as a missing permission check, with no CVSS vector officially assigned as of the advisory date [3].
Mitigation
Status As of October 2025, the Publish to Bitbucket Plugin is listed as an unresolved security issue in the Jenkins advisory [2]. No patched version has been released, and the plugin's GitHub repository does not indicate an update [4]. Administrators are advised to restrict Overall/Read permissions where possible, remove the plugin if not in use, or monitor for an official fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:publish-to-bitbucketMaven | <= 0.4 | — |
Affected products
2- Range: <=0.4
- Jenkins Project/Jenkins Publish to Bitbucket Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-wpr5-rc2j-99p2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-64150ghsaADVISORY
- www.jenkins.io/security/advisory/2025-10-29/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2025/10/29/2ghsaWEB
News mentions
1- Jenkins Security Advisory 2025-10-29Jenkins Security Advisories · Oct 29, 2025