Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-jfg6-4gx3-3v7w: Jenkins JDepend Plugin vulnerable to XML external entity attacks

Jenkins JDepend Plugin 1.3.1 and earlier includes an outdated version of JDepend Maven Plugin that does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to configure input files for the “Report JDepend” step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

As of publication of this advisory, there is no fix.

ghsa
#git#java#ssrf#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-64134

Jenkins JDepend Plugin vulnerable to XML external entity attacks

High severity GitHub Reviewed Published Oct 29, 2025 to the GitHub Advisory Database • Updated Oct 29, 2025

Package

maven org.jenkins-ci.plugins:jdepend (Maven)

Affected versions

<= 1.3.1

Jenkins JDepend Plugin 1.3.1 and earlier includes an outdated version of JDepend Maven Plugin that does not configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to configure input files for the “Report JDepend” step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

As of publication of this advisory, there is no fix.

References

  • https://nvd.nist.gov/vuln/detail/CVE-2025-64134
  • https://www.jenkins.io/security/advisory/2025-10-29/#SECURITY-2936

Published to the GitHub Advisory Database

Oct 29, 2025

Last updated

Oct 29, 2025

ghsa: Latest News

GHSA-f6x5-jh6r-wrfv: golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds read