Description
In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
INFO
Published Date :
2025-09-03T15:02:26.231Z
Last Modified :
2025-11-04T21:13:43.342Z
Source :
jenkins
AFFECTED PRODUCTS
The following products are affected by CVE-2025-58458 vulnerability.
| Vendors | Products |
|---|---|
| Jenkins |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-58458.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact