Metrics
Affected Vendors & Products
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins
Jenkins jenkins |
|
| CPEs | cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:* cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:* |
|
| Vendors & Products |
Jenkins
Jenkins jenkins |
Thu, 19 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-350 | |
| Metrics |
cvssV3_1
|
ssvc
|
Thu, 19 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | jenkins: Jenkins: Origin validation bypass via DNS rebinding in CLI WebSocket endpoint | |
| Weaknesses | CWE-346 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 19 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins Project
Jenkins Project jenkins |
|
| Vendors & Products |
Jenkins Project
Jenkins Project jenkins |
Wed, 18 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation. | |
| References |
|
Status: PUBLISHED
Assigner: jenkins
Published: 2026-03-18T15:15:25.002Z
Updated: 2026-03-19T14:45:46.878Z
Reserved: 2026-03-17T15:04:07.616Z
Link: CVE-2026-33002
Updated: 2026-03-19T14:45:24.513Z
Status : Analyzed
Published: 2026-03-18T16:16:28.187
Modified: 2026-03-21T00:18:44.090
Link: CVE-2026-33002
ReportizFlow