Headline
GHSA-jfg6-4gx3-3v7w: Jenkins JDepend Plugin vulnerable to XML external entity attacks
Jenkins JDepend Plugin 1.3.1 and earlier includes an outdated version of JDepend Maven Plugin that does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to configure input files for the “Report JDepend” step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
As of publication of this advisory, there is no fix.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-64134
Jenkins JDepend Plugin vulnerable to XML external entity attacks
High severity GitHub Reviewed Published Oct 29, 2025 to the GitHub Advisory Database • Updated Oct 29, 2025
Package
maven org.jenkins-ci.plugins:jdepend (Maven)
Affected versions
<= 1.3.1
Jenkins JDepend Plugin 1.3.1 and earlier includes an outdated version of JDepend Maven Plugin that does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to configure input files for the “Report JDepend” step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
As of publication of this advisory, there is no fix.
References
- https://nvd.nist.gov/vuln/detail/CVE-2025-64134
- https://www.jenkins.io/security/advisory/2025-10-29/#SECURITY-2936
Published to the GitHub Advisory Database
Oct 29, 2025
Last updated
Oct 29, 2025