Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses padLeft(32, '0') when it should use padLeft(64, '0') because SHA-256 produces 32 bytes which equates to 64 hex characters. This vulnerability is fixed in 2.2.
References
| Link | Resource |
|---|---|
| https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a | Patch |
| https://github.com/samrocketman/jervis/security/advisories/GHSA-67rj-pjg6-pq59 | Patch Vendor Advisory |
Configurations
History
20 Jan 2026, 17:13
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Samrocketman
Samrocketman jervis |
|
| CPE | cpe:2.3:a:samrocketman:jervis:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a - Patch | |
| References | () https://github.com/samrocketman/jervis/security/advisories/GHSA-67rj-pjg6-pq59 - Patch, Vendor Advisory |
13 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 20:16
Updated : 2026-01-20 17:13
NVD link : CVE-2025-68702
Mitre link : CVE-2025-68702
CVE.ORG link : CVE-2025-68702
JSON object : View
Products Affected
samrocketman
- jervis
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
