Jenkins

Jenkins

251 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Published 17.09.2025 13:17:48
  • Last modified 02.10.2025 18:44:35

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not restrict or transform the characters that can be inserted from user-specified content in log messages, allowing attackers able to control log message contents to insert line break characters...

  • EPSS 0.3%
  • Published 17.09.2025 13:17:47
  • Last modified 02.10.2025 18:47:33

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check in the sidepanel of a page intentionally accessible to users lacking Overall/Read permission, allowing attackers without Overall/Read permission to list agent name...

  • EPSS 0.03%
  • Published 17.09.2025 13:17:47
  • Last modified 02.10.2025 18:47:05

Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check for the authenticated user profile dropdown menu, allowing attackers without Overall/Read permission to obtain limited information about the Jenkins configuration ...

  • EPSS 0.04%
  • Published 04.07.2025 08:36:35
  • Last modified 18.08.2025 19:02:46

A vulnerability was found in Red Hat OpenShift Jenkins. The bearer token is not obfuscated in the logs and potentially carries a high risk if those logs are centralized when collected. The token is typically valid for one year. This flaw allows a mal...

  • EPSS 0.04%
  • Published 02.04.2025 15:15:59
  • Last modified 29.04.2025 14:03:21

A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Extended Read permission to copy an agent, gaining access to its configuration.

  • EPSS 0.04%
  • Published 02.04.2025 15:15:59
  • Last modified 29.04.2025 13:56:43

A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Configure permission to copy an agent, gaining access to encrypted secrets in its configuration.

  • EPSS 0.12%
  • Published 05.03.2025 23:15:14
  • Last modified 24.06.2025 00:46:38

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of views via REST API or CLI, allowing attackers with View/Read permission to view encrypted values of secrets.

  • EPSS 0.05%
  • Published 05.03.2025 23:15:14
  • Last modified 24.06.2025 00:45:20

A cross-site request forgery (CSRF) vulnerability in Jenkins 2.499 and earlier, LTS 2.492.1 and earlier allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets).

  • EPSS 0.09%
  • Published 05.03.2025 23:15:14
  • Last modified 24.06.2025 00:42:16

In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash (`\`) characters are considered safe, allowing attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different si...

  • EPSS 0.04%
  • Published 05.03.2025 23:15:13
  • Last modified 24.06.2025 00:48:40

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of agents via REST API or CLI, allowing attackers with Agent/Extended Read permission to view encrypted values of secrets.