CVE-2025-68704

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses java.util.Random() which is not cryptographically secure for timing attack mitigation. This vulnerability is fixed in 2.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:samrocketman:jervis:*:*:*:*:*:*:*:*

History

20 Jan 2026, 17:36

Type Values Removed Values Added
References () https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a - () https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a - Patch
References () https://github.com/samrocketman/jervis/security/advisories/GHSA-c9q6-g3hr-8gww - () https://github.com/samrocketman/jervis/security/advisories/GHSA-c9q6-g3hr-8gww - Vendor Advisory, Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Samrocketman
Samrocketman jervis
CPE cpe:2.3:a:samrocketman:jervis:*:*:*:*:*:*:*:*

13 Jan 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-13 20:16

Updated : 2026-01-20 17:36


NVD link : CVE-2025-68704

Mitre link : CVE-2025-68704

CVE.ORG link : CVE-2025-68704


JSON object : View

Products Affected

samrocketman

  • jervis
CWE
CWE-330

Use of Insufficiently Random Values