CVE-2025-68701

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-68701
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68701.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68701
Aliases
Published
2026-01-13T19:21:30.074Z
Modified
2026-01-16T06:51:24.467993Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Jervis has Deterministic AES IV Derivation from Passphrase
Details

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses deterministic AES IV derivation from a passphrase. This vulnerability is fixed in 2.2.

Database specific
{
    "cwe_ids": [
        "CWE-327",
        "CWE-340"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68701.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/samrocketman/jervis

Affected ranges

Type
GIT
Repo
https://github.com/samrocketman/jervis
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

jervis-0.*

jervis-0.1
jervis-0.10
jervis-0.11
jervis-0.12
jervis-0.13
jervis-0.2
jervis-0.3
jervis-0.4
jervis-0.5
jervis-0.5.1
jervis-0.5.2
jervis-0.6
jervis-0.7
jervis-0.8
jervis-0.9

jervis-1.*

jervis-1.0
jervis-1.1
jervis-1.2
jervis-1.3
jervis-1.4
jervis-1.5
jervis-1.6
jervis-1.7

jervis-2.*

jervis-2.0
jervis-2.1

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68701.json"