Changeflow GovPing Data Privacy & Cybersecurity Jenkins Vulnerabilities Allow Code Execution an...
Priority review Notice Amended Final

Jenkins Vulnerabilities Allow Code Execution and Info Disclosure

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 18th, 2026
Detected March 19th, 2026
Email

Summary

CERT-Bund has issued a security advisory for Jenkins, detailing multiple vulnerabilities with a high CVSS base score. These vulnerabilities allow attackers to execute arbitrary code, bypass security measures, and disclose confidential information. Affected versions include Jenkins weekly <2.555 and Jenkins LTS <2.541.3.

What changed

CERT-Bund has released Security Advisory WID-SEC-2026-0779 concerning critical vulnerabilities in Jenkins. The advisory highlights multiple flaws that, if exploited, could lead to arbitrary code execution, security bypass, and unauthorized disclosure of sensitive information. The vulnerabilities affect Jenkins weekly versions prior to 2.555 and Jenkins LTS versions prior to 2.541.3, as well as the Jenkins LoadNinja Plugin version <2.2. The advisory notes a high CVSS base score of 8.8, indicating a significant security risk.

Organizations utilizing affected Jenkins versions must take immediate action to mitigate these risks. Recommended actions include updating Jenkins to the patched versions (Jenkins weekly >=2.555 and Jenkins LTS >=2.541.3) or applying available mitigations if immediate patching is not feasible. Failure to address these vulnerabilities could result in severe security breaches, including system compromise and data exfiltration. The advisory provides links to CVE information and version history for further details.

What to do next

  1. Update Jenkins weekly to version 2.555 or later.
  2. Update Jenkins LTS to version 2.541.3 or later.
  3. Apply available mitigations if immediate patching is not possible.

Source document (simplified)

[WID-SEC-2026-0779] Jenkins: Mehrere Schwachstellen CVSS Base Score 8.8 (hoch) CVSS Temporal Score 7.7 (hoch) Remoteangriff ja Datum 18.03.2026 Stand 19.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Jenkins ist ein erweiterbarer, webbasierter Integration Server zur kontinuierlichen Unterstützung bei Softwareentwicklungen aller Art.

Produkte

18.03.2026
- Jenkins Jenkins weekly <2.555

  • Jenkins Jenkins LTS <2.541.3

  • Jenkins Jenkins LoadNinja Plugin <2.2

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in Jenkins ausnutzen, um beliebigen Programmcode auszuführen, Sicherheitsmaßnahmen zu umgehen oder vertrauliche Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 18th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0779

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Software Development System Administration
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Development Information Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.