CHECKMARX JENKINS PLUGIN COMPROMISED WITH INFOSTEALER
INDUSTRY DESK■ 2 MIN READ
MON, MAY 11, 2026■ AI-SUMMARIZED FROM 1 SOURCE ▸ TIMELINE
Checkmarx discovered a malicious version of its Jenkins Application Security Testing (AST) plugin published on the official Jenkins Marketplace. The rogue package contained infostealer malware designed to harvest sensitive data.
Checkmarx security researchers identified the compromised plugin over the weekend and immediately notified the Jenkins community. The malicious version was hosted on the legitimate Jenkins Marketplace, making it difficult for users to distinguish from the official release.
The infostealer payload was designed to extract credentials, environment variables, and other sensitive information from compromised systems. Jenkins environments are common targets due to their access to build pipelines, source code repositories, and deployment credentials.
Immediate Actions
Checkmarx confirmed the plugin has been removed from the Jenkins Marketplace. The company released a statement urging users to:
- Audit their Jenkins instances for the malicious plugin
- Remove any suspicious versions immediately
- Rotate exposed credentials
- Review build logs and pipeline activity for unauthorized access
Jenkins maintainers were notified and security advisories were published. Users who installed the compromised package face potential exposure of their build infrastructure and connected systems.
Investigation Details
The exact attack vector used to compromise the official plugin repository remains under investigation. Security researchers are analyzing the malware to determine its full capabilities and any data that may have been exfiltrated.
This incident underscores the ongoing risk of supply chain attacks targeting development tools. Jenkins plugins are widely deployed across enterprise CI/CD pipelines, making them attractive targets for threat actors seeking access to sensitive infrastructure.
Recommendations
Users should verify plugin sources and enable Jenkins security scanning. Organizations are advised to implement strict access controls on Jenkins instances and monitor plugin installations carefully. The Jenkins community has called for enhanced vetting procedures for marketplace submissions to prevent similar incidents.
■ MORE FROM THE SECURITY DESK
Cross-platform text messaging between Android and iPhone users can now be encrypted. Google's years-long push for Apple to adopt RCS texting has finally materialized into improved security.
JUST NOW— Industry Desk
Yarbo plans to completely remove remote backdoor access from its robot lawn mower following security concerns. The feature will no longer be installed by default, with customers able to opt in if desired.
1H AGO— Industry Desk
Popular TanStack NPM packages were compromised, affecting developers who use the widely-adopted routing and utility libraries. The vulnerability was reported on the TanStack Router GitHub issue tracker.
1H AGO— Industry Desk
A security researcher has released GhostLock, a proof-of-concept tool that abuses legitimate Windows file APIs to deny access to local and network-shared files. The vulnerability demonstrates a critical gap in how Windows handles file permissions.
1H AGO— Dev Desk