Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses PKCS1Encoding which is vulnerable to Bleichenbacher padding oracle attacks. Modern systems should use OAEP (Optimal Asymmetric Encryption Padding). This vulnerability is fixed in 2.2.
References
Configurations
History
20 Jan 2026, 17:11
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:samrocketman:jervis:*:*:*:*:*:*:*:* | |
| References | () https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a - Patch | |
| References | () https://github.com/samrocketman/jervis/security/advisories/GHSA-mqw7-c5gg-xq97 - Vendor Advisory | |
| First Time |
Samrocketman
Samrocketman jervis |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
13 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 20:16
Updated : 2026-01-20 17:11
NVD link : CVE-2025-68698
Mitre link : CVE-2025-68698
CVE.ORG link : CVE-2025-68698
JSON object : View
Products Affected
samrocketman
- jervis
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
