Description

In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

INFO

Published Date :

2025-09-03T15:02:26.231Z

Last Modified :

2025-11-04T21:13:43.342Z

Source :

jenkins
AFFECTED PRODUCTS

The following products are affected by CVE-2025-58458 vulnerability.

Vendors Products
Jenkins
  • Git Client
  • Git Client Plugin
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-58458.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact