Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v8hg-m323-jvjq | Jenkins Git client Plugin has an OS command injection vulnerability on agents in Git client Plugin |
Wed, 17 Dec 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins git Client
|
|
| CPEs | cpe:2.3:a:jenkins:git_client:*:*:*:*:*:jenkins:*:* | |
| Vendors & Products |
Jenkins git Client
|
Wed, 10 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins
Jenkins git |
|
| Vendors & Products |
Jenkins
Jenkins git |
Wed, 10 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
cvssV3_1
|
Wed, 10 Dec 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jenkins Git client Plugin 6.4.0 and earlier does not not correctly escape the path to the workspace directory as part of an argument in a temporary shell script generated by the plugin, allowing attackers able to control the workspace directory name to inject arbitrary OS commands. | |
| References |
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-12-10T17:26:12.968Z
Reserved: 2025-12-09T17:33:01.216Z
Link: CVE-2025-67640
Updated: 2025-12-10T17:25:46.443Z
Status : Analyzed
Published: 2025-12-10T17:15:56.517
Modified: 2025-12-17T17:31:23.030
Link: CVE-2025-67640
No data.
OpenCVE Enrichment
Updated: 2025-12-10T21:33:04Z
Github GHSA