CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “jenkins”

699 vulnerabilities found for “jenkins”

Page 1 of 35

CVE-2025-67640
MEDIUM5.0

Jenkins Git client Plugin 6.4.0 and earlier does not not correctly escape the path to the workspace directory as part of an argument in a temporary shell script generated by the plugin, allowing attackers able to control the workspace directory name to inject arbitrary OS commands.

jenkins / git_client
Network
Published Dec 10, 2025
Page 1 of 35
CVE-2025-64137
MEDIUM4.3

A missing permission check in Jenkins Themis Plugin 1.4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server.

jenkins / themis
Network
Published Oct 29, 2025
CVE-2025-64136
MEDIUM4.3

A cross-site request forgery (CSRF) vulnerability in Jenkins Themis Plugin 1.4.1 and earlier allows attackers to connect to an attacker-specified HTTP server.

jenkins / themis
Network
Published Oct 29, 2025
CVE-2025-58458
MEDIUM4.3

In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

jenkins / git_client+2
Network
Published Sep 3, 2025
CVE-2022-41231
MEDIUM5.7

Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers with Item/Configure permission to create or replace any config.xml file on the Jenkins controller file system by providing a crafted file name to an API endpoint.

jenkins / build-publisher
Network
Published Sep 21, 2022
CVE-2022-41230
MEDIUM4.3

Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers.

jenkins / build-publisher
Network
Published Sep 21, 2022
CVE-2022-41232
HIGH8.0

A cross-site request forgery (CSRF) vulnerability in Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers to replace any config.xml file on the Jenkins controller file system with an empty file by providing a crafted file name to an API endpoint.

jenkins / build-publisher
Network
Published Sep 21, 2022
CVE-2022-36881
HIGH8.1

Jenkins Git client Plugin 3.11.0 and earlier does not perform SSH host key verification when connecting to Git repositories via SSH, enabling man-in-the-middle attacks.

jenkins / git_client
Network
Published Jul 27, 2022
CVE-2019-10451
MEDIUM4.3

Jenkins SOASTA CloudTest Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

jenkins / soasta_cloudtest
Network
Published Oct 16, 2019
CVE-2019-10433
LOW3.3

Jenkins Dingding[钉钉] Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

jenkins / dingding
Local
Published Oct 1, 2019
CVE-2019-10434
HIGH7.5

Jenkins LDAP Email Plugin transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

jenkins / ldap_email
Network
Published Oct 1, 2019
CVE-2019-10392
HIGH8.8

Jenkins Git Client Plugin 2.8.4 and earlier and 3.0.0-rc did not properly restrict values passed as URL argument to an invocation of 'git ls-remote', resulting in OS command injection.

jenkins / git_client+1
Network
Published Sep 12, 2019
CVE-2019-10391
MEDIUM6.5

Jenkins IBM Application Security on Cloud Plugin 1.2.4 and earlier transmitted configured passwords in plain text as part of job configuration forms, potentially resulting in their exposure.

jenkins / ibm_application_security_on_cloud
Network
Published Aug 28, 2019
CVE-2019-1003090
MEDIUM6.5

A cross-site request forgery vulnerability in Jenkins SOASTA CloudTest Plugin in the CloudTestServer.DescriptorImpl#doValidate form validation method allows attackers to initiate a connection to an attacker-specified server.

jenkins / soasta_cloudtest
Network
Published Apr 4, 2019
CVE-2019-1003051
HIGH8.8

Jenkins IRC Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

jenkins / irc
Network
Published Apr 4, 2019
CVE-2019-1003089
MEDIUM6.5

Jenkins Upload to pgyer Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

jenkins / upload_to_pgyer
Network
Published Apr 4, 2019
CVE-2019-1003091
MEDIUM6.5

A missing permission check in Jenkins SOASTA CloudTest Plugin in the CloudTestServer.DescriptorImpl#doValidate form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

jenkins / soasta_cloudtest
Network
Published Apr 4, 2019
CVE-2019-1003028
MEDIUM4.3

A server-side request forgery vulnerability exists in Jenkins JMS Messaging Plugin 1.1.1 and earlier in SSLCertificateAuthenticationMethod.java, UsernameAuthenticationMethod.java that allows attackers with Overall/Read permission to have Jenkins connect to a JMS endpoint.

jenkins / jms_messaging
Network
Published Feb 20, 2019
CVE-2018-1000404
HIGH7.8

Jenkins project Jenkins AWS CodeBuild Plugin version 0.26 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSClientFactory.java, CodeBuilder.java that can result in Credentials Disclosure. This attack appear to be exploitable via local file access. This vulnerability appears to have been fixed in 0.27 and later.

jenkins / aws_codebuild
Local
Published Jul 9, 2018
CVE-2018-1000145
MEDIUM6.5

An exposure of sensitive information vulnerability exists in Jenkins Perforce Plugin version 1.3.36 and older in PerforcePasswordEncryptor.java that allows attackers with local file system access to obtain encrypted Perforce passwords and decrypt them.

jenkins / perforce
Network
Published Apr 5, 2018