Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, the code doesn't validate that the JWT header specifies "alg":"RS256". This vulnerability is fixed in 2.2.
References
| Link | Resource |
|---|---|
| https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a | Patch |
| https://github.com/samrocketman/jervis/security/advisories/GHSA-5pq9-5mpr-jj85 | Vendor Advisory Patch |
Configurations
History
20 Jan 2026, 17:37
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Samrocketman
Samrocketman jervis |
|
| References | () https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a - Patch | |
| References | () https://github.com/samrocketman/jervis/security/advisories/GHSA-5pq9-5mpr-jj85 - Vendor Advisory, Patch | |
| CPE | cpe:2.3:a:samrocketman:jervis:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
13 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 20:16
Updated : 2026-01-20 17:37
NVD link : CVE-2025-68925
Mitre link : CVE-2025-68925
CVE.ORG link : CVE-2025-68925
JSON object : View
Products Affected
samrocketman
- jervis
CWE
CWE-347
Improper Verification of Cryptographic Signature
