CVE-2025-59476
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-11-04
Assigner: Jenkins Project
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jenkins | jenkins | to 2.516.3 (exc) |
| jenkins | jenkins | to 2.528 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-117 | The product constructs a log message from external input, but it does not neutralize or incorrectly neutralizes special elements when the message is written to a log file. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Jenkins versions 2.527 and earlier, including LTS 2.516.2 and earlier, allows attackers who can control log message contents to insert line break characters and then add forged log messages. This means the attacker can manipulate the log output to mislead administrators who are reviewing the logs.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to insert misleading or forged log entries, which can cause administrators to misinterpret the system's behavior or security events. This can hinder incident response, troubleshooting, and auditing processes, potentially allowing malicious activities to go unnoticed.