Cyber Posture

CVE-2025-68931

High

Published: 13 January 2026

Published
13 January 2026
Modified
20 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0003 10.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-68931 is a high-severity Improper Authentication (CWE-287) vulnerability in Samrocketman Jervis. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Stored Data Manipulation (T1565.001); ranked at the 10.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Stored Data Manipulation (T1565.001).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-287

Detects unauthorized successful logons resulting from improper authentication implementations.

addresses: CWE-287

Documented procedures ensure personnel are trained on authentication mechanisms, tangibly lowering the risk of improper authentication being exploited.

addresses: CWE-287

Security awareness training instructs users on secure authentication practices and avoiding credential compromise.

addresses: CWE-287

Training on authentication mechanisms and best practices decreases the occurrence of improper authentication.

addresses: CWE-327

Contacts with security groups provide timely information on broken or risky cryptographic algorithms, reducing the likelihood of their selection and use.

addresses: CWE-287

Non-repudiation requires strong authentication mechanisms to irrefutably attribute performed actions to specific individuals or processes.

addresses: CWE-287

Session content review can reveal authentication bypasses or failures in session establishment.

addresses: CWE-287

Review of authentication-related audit records can detect improper authentication mechanisms or bypasses.

MITRE ATT&CK Enterprise TechniquesAI

T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

Padding oracle and unauthenticated AES-CBC usage directly enables integrity tampering of encrypted data (ciphertext manipulation), mapping to stored data manipulation.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, AES/CBC/PKCS5Padding lacks authentication, making it vulnerable to padding oracle attacks and ciphertext manipulation. This vulnerability is fixed in 2.2.

Deeper analysisAI

CVE-2025-68931 affects Jervis, a library used for Job DSL plugin scripts and shared Jenkins pipeline libraries in versions prior to 2.2. The vulnerability arises from the implementation of AES/CBC/PKCS5Padding without authentication, which exposes it to padding oracle attacks and ciphertext manipulation. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and maps to CWEs 287 (Improper Authentication) and 327 (Broken Cryptographic Algorithm).

Remote attackers can exploit this vulnerability over the network with low attack complexity, requiring no privileges, user interaction, or special conditions. Exploitation enables high-impact integrity violations, such as modifying encrypted data through padding oracle techniques or direct ciphertext tampering, while confidentiality and availability remain unaffected.

The issue is addressed in Jervis version 2.2. Security practitioners should review the GitHub security advisory at https://github.com/samrocketman/jervis/security/advisories/GHSA-gxp5-mv27-vjcj and the fixing commit at https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a for patch details and upgrade guidance.

Details

CWE(s)

Affected Products

samrocketman
jervis
≤ 2.2

CVEs Like This One

CVE-2025-68698Same product: Samrocketman Jervis
CVE-2025-68702Same product: Samrocketman Jervis
CVE-2025-68701Same product: Samrocketman Jervis
CVE-2025-68704Same product: Samrocketman Jervis
CVE-2025-68703Same product: Samrocketman Jervis
CVE-2026-34204Shared CWE-287
CVE-2025-11661Shared CWE-287
CVE-2026-5570Shared CWE-287
CVE-2026-42560Shared CWE-287
CVE-2024-57490Shared CWE-287

References