Vulnerability Description
Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses padLeft(32, '0') when it should use padLeft(64, '0') because SHA-256 produces 32 bytes which equates to 64 hex characters. This vulnerability is fixed in 2.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Samrocketman | Jervis | < 2.2 |
Related Weaknesses (CWE)
References
- https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2aPatch
- https://github.com/samrocketman/jervis/security/advisories/GHSA-67rj-pjg6-pq59PatchVendor Advisory
FAQ
What is CVE-2025-68702?
CVE-2025-68702 is a vulnerability with a CVSS score of 7.5 (HIGH). Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses padLeft(32, '0') when it should use padLeft(64, '0') because SHA-256 produces 32 bytes ...
How severe is CVE-2025-68702?
CVE-2025-68702 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-68702?
Check the references section above for vendor advisories and patch information. Affected products include: Samrocketman Jervis.