CVE-2025-64132
Java vulnerability analysis and mitigation

Overview

CVE-2025-64132 affects the Jenkins MCP Server Plugin versions 0.84.v50ca_24ef83f2 and earlier, disclosed on October 29, 2025. The vulnerability stems from missing permission checks in multiple MCP tools, which could allow attackers to access unauthorized information and trigger unauthorized builds (Jenkins Project).

Technical details

The vulnerability is rated as Medium severity and involves insufficient permission validation in several MCP tools. The issue allows attackers with basic Item/Read permission to access information about configured SCM in jobs without having Item/Extended Read permission, trigger new builds without Item/Build permission, and retrieve cloud configuration names without Overall/Read permission (Jenkins Project). The vulnerability has been assigned a CVSS 3.1 Base Score of 5.4 MEDIUM (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) (NVD).

Impact

The vulnerability's impact includes unauthorized access to sensitive job configuration information, unauthorized build triggering capabilities, and exposure of cloud configuration details. This creates potential security risks through information disclosure and unauthorized build execution (Jenkins Project, GBHackers).

Mitigation and workarounds

The vulnerability has been fixed in MCP Server Plugin version 0.86.v7d3355e6aa18, which implements proper permission checks for the affected MCP tools. Users are advised to update to this version to mitigate the security risk (Jenkins Project).

Community reactions

The vulnerability was discovered and reported by Kevin Guerroudj from CloudBees, Inc., highlighting the active security research within the Jenkins community (Jenkins Project).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55749HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-tool-jetty-resources
NoYesDec 01, 2025
CVE-2025-13806MEDIUM6.9
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-13805MEDIUM6.3
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-13804MEDIUM5.3
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-66372LOW2.8
  • JavaJava
  • org.mustangproject:library
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management