Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection

Posted on June 9, 2025June 9, 2025 By CWS

A vital cross-site scripting (XSS) vulnerability within the widespread Jenkins Gatling Plugin permits attackers to bypass Content material-Safety-Coverage (CSP) protections. 

The vulnerability, tracked as CVE-2025-5806, impacts Gatling Plugin model 136.vb_9009b_3d33a_e and poses important dangers to Jenkins environments using this efficiency testing integration software.

The vulnerability stems from how Gatling Plugin 136.vb_9009b_3d33a_e serves Gatling efficiency testing reviews throughout the Jenkins setting. 

The plugin fails to correctly implement Content material-Safety-Coverage restrictions that have been initially launched in Jenkins variations 1.641 and 1.625.3 as a basic safety measure towards XSS assaults.

Jenkins Gatling Plugin Vulnerability

Content material-Safety-Coverage (CSP) is a vital internet safety customary that helps forestall cross-site scripting assaults by controlling which sources may be loaded and executed by an online web page. 

When correctly carried out, CSP acts as a defensive barrier that restricts the execution of unauthorized scripts, even when malicious content material is injected into the appliance. 

Nevertheless, the Gatling Plugin’s present implementation bypasses these protections totally when rendering efficiency check reviews.

The vulnerability particularly manifests within the plugin’s report serving mechanism, the place user-controlled content material inside Gatling reviews may be leveraged to inject and execute malicious JavaScript code. 

This bypass happens as a result of the plugin processes and shows report content material with out adequately implementing the CSP headers that may usually forestall such script execution.

The exploitation of this vulnerability requires customers with the power to switch Gatling report content material, which usually contains builders, QA engineers, and system directors with acceptable Jenkins permissions. 

As soon as exploited, attackers can execute arbitrary JavaScript code throughout the context of the Jenkins software, doubtlessly resulting in session hijacking, credential theft, or unauthorized administrative actions.

The excessive CVSS severity ranking assigned to this vulnerability displays its potential for important influence on Jenkins’ infrastructure. 

Profitable exploitation might allow attackers to govern Jenkins configurations, entry delicate construct data, modify deployment pipelines, or escalate privileges throughout the system. 

Given Jenkins’ central position in lots of CI/CD environments, such a compromise might have cascading results throughout whole growth and deployment workflows.

Threat FactorsDetailsAffected ProductsJenkins Gatling Plugin variations ≤ 136.vb_9009b_3d33a_eImpact– Arbitrary script execution- Session/cookie theft- CSP bypass- Privilege escalation risksExploit Prerequisites1. Attacker has entry to switch the Gatling report content material. 2. The sufferer views a malicious report. 3. Unpatched Jenkins CSP implementationCVSS 3.1 Score8.1 (Excessive)

Mitigation 

Jenkins’ safety staff has confirmed that no patches are presently obtainable for the affected Gatling Plugin model 136.vb_9009b_3d33a_e. 

The advisory explicitly states that as of the publication date, there isn’t any repair for this vulnerability, representing an uncommon scenario the place Jenkins has disclosed a vulnerability with out an accompanying patch.

The first mitigation technique advisable by Jenkins entails downgrading to Gatling Plugin model 1.3.0, which isn’t affected by this vulnerability. 

Organizations ought to instantly assess their Jenkins environments to determine installations operating the weak plugin model and plan for downgrade procedures.

Safety groups ought to implement extra monitoring for uncommon Jenkins exercise, notably specializing in report technology and viewing actions. Community segmentation and entry controls needs to be reviewed to restrict the publicity of Jenkins cases to untrusted customers.

Organizations unable to right away downgrade ought to think about quickly disabling the Gatling Plugin till a everlasting repair turns into obtainable.

Strive Subsequent-gen Antivirus that Elevates Endpoint Safety for Free

Cyber Security News Tags:Attackers, Bypass, ContentSecurityPolicy, Gatling, Jenkins, Plugin, Protection, Vulnerability

Post navigation

Previous Post: Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks
Next Post: iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals

Related Posts

CefSharp Enumeration Tool Reveals Security Vulnerabilities in .NET Desktop Apps Cyber Security News
Zoom Clients for Windows Vulnerability Exposes Users to DoS Attacks Cyber Security News
Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads Cyber Security News
Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches Cyber Security News
Retired US Air Force Employee Pleads Guilty for Sharing Military Secrets on a Dating App Cyber Security News
Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News