CVE-2026-33002
- EPSS 0.04%
- Veröffentlicht 18.03.2026 15:15:25
- Zuletzt bearbeitet 21.03.2026 00:18:44
Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarde...
CVE-2026-33001
- EPSS 0.11%
- Veröffentlicht 18.03.2026 15:15:23
- Zuletzt bearbeitet 20.03.2026 18:08:15
Jenkins 2.554 and earlier, LTS 2.541.2 and earlier does not safely handle symbolic links during the extraction of .tar and .tar.gz archives, allowing crafted archives to write files to arbitrary locations on the filesystem, restricted only by file sy...
CVE-2026-27100
- EPSS 0.14%
- Veröffentlicht 18.02.2026 14:17:44
- Zuletzt bearbeitet 20.02.2026 20:53:16
Jenkins 2.550 and earlier, LTS 2.541.1 and earlier accepts Run Parameter values that refer to builds the user submitting the build does not have access to, allowing attackers with Item/Build and Item/Configure permission to obtain information about t...
- EPSS 0.05%
- Veröffentlicht 18.02.2026 14:17:43
- Zuletzt bearbeitet 20.02.2026 20:52:03
Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the "Mark temporarily offline" offline cause, resulting in a stored cross-site scripting (XSS) vulnerability e...
CVE-2025-67639
- EPSS 0.06%
- Veröffentlicht 10.12.2025 16:50:38
- Zuletzt bearbeitet 17.12.2025 20:23:49
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.540 and earlier, LTS 2.528.2 and earlier allows attackers to trick users into logging in to the attacker's account.
CVE-2025-67638
- EPSS 0.03%
- Veröffentlicht 10.12.2025 16:50:37
- Zuletzt bearbeitet 17.12.2025 17:37:39
Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not mask build authorization tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-67636
- EPSS 0.25%
- Veröffentlicht 10.12.2025 16:50:36
- Zuletzt bearbeitet 17.12.2025 17:39:26
A missing permission check in Jenkins 2.540 and earlier, LTS 2.528.2 and earlier allows attackers with View/Read permission to view encrypted password values in views.
CVE-2025-67637
- EPSS 0.07%
- Veröffentlicht 10.12.2025 16:50:36
- Zuletzt bearbeitet 17.12.2025 17:39:11
Jenkins 2.540 and earlier, LTS 2.528.2 and earlier stores build authorization tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controlle...
CVE-2025-67635
- EPSS 0.12%
- Veröffentlicht 10.12.2025 16:50:35
- Zuletzt bearbeitet 17.12.2025 17:39:45
Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not properly close HTTP-based CLI connections when the connection stream becomes corrupted, allowing unauthenticated attackers to cause a denial of service.
CVE-2025-59476
- EPSS 0.08%
- Veröffentlicht 17.09.2025 13:17:48
- Zuletzt bearbeitet 04.11.2025 22:16:35
Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not restrict or transform the characters that can be inserted from user-specified content in log messages, allowing attackers able to control log message contents to insert line break characters...