CVE-2025-67640

Severity
5.0MEDIUM
EPSS
0.1%
top 67.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 10

Description

Jenkins Git client Plugin 6.4.0 and earlier does not not correctly escape the path to the workspace directory as part of an argument in a temporary shell script generated by the plugin, allowing attackers able to control the workspace directory name to inject arbitrary OS commands.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:LExploitability: 1.6 | Impact: 3.4

Affected Packages3 packages

🔴Vulnerability Details

3
OSV
Jenkins Git client Plugin has an OS command injection vulnerability on agents in Git client Plugin2025-12-10
GHSA
Jenkins Git client Plugin has an OS command injection vulnerability on agents in Git client Plugin2025-12-10
CVEList
CVE-2025-67640: Jenkins Git client Plugin 62025-12-10

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2025-12-102025-12-10

🕵️Threat Intelligence

1
Wiz
CVE-2025-67640 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-67640 (MEDIUM CVSS 5) | Jenkins Git client Plugin 6.4.0 and | cvebase.io