Home

Description

Jenkins Git client Plugin 6.4.0 and earlier does not not correctly escape the path to the workspace directory as part of an argument in a temporary shell script generated by the plugin, allowing attackers able to control the workspace directory name to inject arbitrary OS commands.

PUBLISHED Reserved 2025-12-09 | Published 2025-12-10 | Updated 2025-12-10 | Assigner jenkins

Product status

Default status
unaffected

Any version
affected

References

www.jenkins.io/security/advisory/2025-12-10/ (Jenkins Security Advisory 2025-12-10) vendor-advisory

cve.org (CVE-2025-67640)

nvd.nist.gov (CVE-2025-67640)

Download JSON