| Fixing_vulnerabilities |
| 0 |
| url |
VCID-25cp-rjk4-gfdb |
| vulnerability_id |
VCID-25cp-rjk4-gfdb |
| summary |
XSS vulnerability in Jenkins notification bar
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification bar response contents (typically shown after form submissions via Apply button).
This results in a cross-site scripting (XSS) vulnerability exploitable by attackers able to influence notification bar contents.
Jenkins 2.275, LTS 2.263.2 escapes the content shown in notification bars. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21603 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.5494 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54816 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54887 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54913 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54883 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54932 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54931 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54943 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54925 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54902 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21603 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21603, GHSA-98gq-6hxg-52r6
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-25cp-rjk4-gfdb |
|
| 1 |
| url |
VCID-25jg-8vxe-1feu |
| vulnerability_id |
VCID-25jg-8vxe-1feu |
| summary |
Missing permission check for paths with specific prefix in Jenkins
Jenkins includes a static list of URLs that are always accessible even without Overall/Read permission, such as the login form. These URLs are excluded from an otherwise universal permission check.
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly compare requested URLs with that list.
This allows attackers without Overall/Read permission to access plugin-provided URLs with any of the following prefixes if no other permissions are required:
- `accessDenied`
- `error`
- `instance-identity`
- `login`
- `logout`
- `oops`
- `securityRealm`
- `signup`
- `tcpSlaveAgentListener`
For example, a plugin contributing the path `loginFoo/` would have URLs in that space accessible without the default Overall/Read permission check.
The Jenkins security team is not aware of any affected plugins as of the publication of this advisory.
The comparison of requested URLs with the list of always accessible URLs has been fixed to only allow access to the specific listed URLs in Jenkins 2.275, LTS 2.263.2.
In case this change causes problems, additional paths can be made accessible without Overall/Read permissions: The [Java system property](https://www.jenkins.io/doc/book/managing/system-properties/) `jenkins.model.Jenkins.additionalReadablePaths` is a comma-separated list of additional path prefixes to allow access to. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21609 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35481 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.3532 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35518 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35544 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35426 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35472 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35496 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35507 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35463 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35441 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21609 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21609, GHSA-4625-q52w-39cx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-25jg-8vxe-1feu |
|
| 2 |
| url |
VCID-3y23-krs1-yudh |
| vulnerability_id |
VCID-3y23-krs1-yudh |
| summary |
Excessive memory allocation in graph URLs leads to denial of service in Jenkins
Jenkins renders several different graphs for features like agent and label usage statistics, memory usage, or various plugin-provided statistics.
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit the graph size provided as query parameters.
This allows attackers to request or to have legitimate Jenkins users request crafted URLs that rapidly use all available memory in Jenkins, potentially leading to out of memory errors.
Jenkins 2.275, LTS 2.263.2 limits the maximum size of graphs to an area of 10 million pixels. If a larger size is requested, the default size for the graph will be rendered instead.
This threshold can be configured by setting the [Java system property](https://www.jenkins.io/doc/book/managing/system-properties/) `hudson.util.Graph.maxArea` to a different number on startup. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21607 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.55943 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56054 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56075 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56105 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.5611 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56121 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56097 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56081 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21607 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21607, GHSA-cxqw-vjcr-gp5g
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3y23-krs1-yudh |
|
| 3 |
| url |
VCID-3ynh-xzxn-jkgy |
| vulnerability_id |
VCID-3ynh-xzxn-jkgy |
| summary |
Arbitrary file read vulnerability in workspace browsers in Jenkins
The file browser for workspaces, archived artifacts, and `$JENKINS_HOME/userContent/` follows symbolic links to locations outside the directory being browsed in Jenkins 2.274 and earlier, LTS 2.263.1 and earlier.
This allows attackers with Job/Workspace permission and the ability to control workspace contents (e.g., with Job/Configure permission or the ability to change SCM contents) to create symbolic links that allow them to access files outside workspaces using the workspace browser.
This issue is caused by an incomplete fix for SECURITY-904 / CVE-2018-1000862 in the [2018-12-08 security advisory](https://www.jenkins.io/security/advisory/2018-12-05/#SECURITY-904).
Jenkins 2.275, LTS 2.263.2 no longer supports symlinks in workspace browsers. While they may still exist on the file system, they are no longer shown on the UI, accessible via URLs, or included in directory content downloads.
This fix only changes the behavior of the Jenkins UI. Archiving artifacts still behaves as before. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21602 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01393 |
| scoring_system |
epss |
| scoring_elements |
0.80402 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01393 |
| scoring_system |
epss |
| scoring_elements |
0.80322 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01393 |
| scoring_system |
epss |
| scoring_elements |
0.80329 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01393 |
| scoring_system |
epss |
| scoring_elements |
0.80349 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01393 |
| scoring_system |
epss |
| scoring_elements |
0.80338 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01393 |
| scoring_system |
epss |
| scoring_elements |
0.80366 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01393 |
| scoring_system |
epss |
| scoring_elements |
0.80377 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01393 |
| scoring_system |
epss |
| scoring_elements |
0.80395 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01393 |
| scoring_system |
epss |
| scoring_elements |
0.8038 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01393 |
| scoring_system |
epss |
| scoring_elements |
0.80373 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21602 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21602, GHSA-vpjm-58cw-r8q5
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3ynh-xzxn-jkgy |
|
| 4 |
| url |
VCID-4y3h-rxbk-cua1 |
| vulnerability_id |
VCID-4y3h-rxbk-cua1 |
| summary |
Arbitrary file existence check in file fingerprints in Jenkins
Jenkins provides a feature for jobs to store and track fingerprints of files used during a build. Jenkins 2.274 and earlier, LTS 2.263.1 and earlier provides a REST API to check where a given fingerprint was used by which builds. This endpoint does not fully validate that the provided fingerprint ID is properly formatted before checking for the XML metadata for that fingerprint on the controller file system.
This allows attackers with Overall/Read permission to check for the existence of XML files on the controller file system where the relative path can be constructed as 32 characters.
Jenkins 2.275, LTS 2.263.2 validates that a fingerprint ID is properly formatted before checking for its existence. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21606 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46412 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46286 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46326 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46346 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46294 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.4635 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46374 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46345 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00235 |
| scoring_system |
epss |
| scoring_elements |
0.46355 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21606 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21606, GHSA-f585-9fw3-rj2m
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4y3h-rxbk-cua1 |
|
| 5 |
| url |
VCID-5yuh-2e55-hfbt |
| vulnerability_id |
VCID-5yuh-2e55-hfbt |
| summary |
Stored XSS vulnerability in Jenkins on new item page
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs of item types.
As of the publication of this advisory, the Jenkins security team is not aware of any plugins published via the Jenkins project update center that allow doing this.
Jenkins 2.275, LTS 2.263.2 escapes display names and IDs of item types shown on the New Item page. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21611 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.5494 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54816 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54887 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54913 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54883 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54932 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54931 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54943 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54925 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54902 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21611 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21611, GHSA-mj7q-cmf3-mg7h
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5yuh-2e55-hfbt |
|
| 6 |
| url |
VCID-6rk7-hffm-nbau |
| vulnerability_id |
VCID-6rk7-hffm-nbau |
| summary |
Reflected XSS vulnerability in Jenkins markup formatter preview
Jenkins allows administrators to choose the markup formatter to use for descriptions of jobs, builds, views, etc. displayed in Jenkins. When editing such a description, users can choose to have Jenkins render a formatted preview of the description they entered.
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not implement any restrictions for the URL rendering the formatted preview of markup passed as a query parameter. This results in a reflected cross-site scripting (XSS) vulnerability if the configured markup formatter does not prohibit unsafe elements (JavaScript) in markup, like [Anything Goes Formatter Plugin](https://plugins.jenkins.io/anything-goes-formatter/).
Jenkins 2.275, LTS 2.263.2 requires that preview URLs are accessed using POST and sets Content-Security-Policy headers that prevent execution of unsafe elements when the URL is accessed directly.
In case of problems with this change, these protections can be disabled by setting the [Java system properties](https://www.jenkins.io/doc/book/managing/system-properties/) `hudson.markup.MarkupFormatter.previewsAllowGET` to `true` and/or `hudson.markup.MarkupFormatter.previewsSetCSP` to `false`. Doing either is discouraged. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21610 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55698 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55519 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55631 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55655 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55633 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55685 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55688 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55697 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55677 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55659 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21610 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21610, GHSA-7qf3-c2q8-69m3
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6rk7-hffm-nbau |
|
| 7 |
| url |
VCID-9zky-rdj1-pudy |
| vulnerability_id |
VCID-9zky-rdj1-pudy |
| summary |
Stored XSS vulnerability in Jenkins button labels
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape button labels in the Jenkins UI.
This results in a cross-site scripting vulnerability exploitable by attackers with the ability to control button labels. An example of buttons with a user-controlled label are the buttons of the Pipeline `input` step.
Jenkins 2.275, LTS 2.263.2 escapes button labels in the Jenkins UI. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21608 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67643 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67531 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67568 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67589 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67567 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67619 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67632 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67655 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67641 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67608 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21608 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21608, GHSA-wv63-gwr9-5c55
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9zky-rdj1-pudy |
|
| 8 |
| url |
VCID-db62-2h4q-x7fv |
| vulnerability_id |
VCID-db62-2h4q-x7fv |
| summary |
Improper handling of REST API XML deserialization errors in Jenkins
Jenkins provides XML REST APIs to configure views, jobs, and other items. When deserialization fails because of invalid data, Jenkins 2.274 and earlier, LTS 2.263.1 and earlier stores invalid object references created through these endpoints in the Old Data Monitor. If an administrator discards the old data, some erroneous data submitted to these endpoints may be persisted.
This allows attackers with View/Create, Job/Create, Agent/Create, or their respective */Configure permissions to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects when discarded by an administrator.\n\nJenkins 2.275, LTS 2.263.2 does not record submissions from users in Old Data Monitor anymore.
In case of problems, the [Java system properties](https://www.jenkins.io/doc/book/managing/system-properties/) `hudson.util.RobustReflectionConverter.recordFailuresForAdmins` and `hudson.util.RobustReflectionConverter.recordFailuresForAllAuthentications` can be set to true to record configuration data submissions from administrators or all users, partially or completely disabling this fix. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21604 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74662 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74579 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74583 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.7461 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74584 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74616 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74631 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74653 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74633 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74625 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21604 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21604, GHSA-qv6f-rcv6-6q3x
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-db62-2h4q-x7fv |
|
| 9 |
| url |
VCID-rrnb-9h1s-vkef |
| vulnerability_id |
VCID-rrnb-9h1s-vkef |
| summary |
Path traversal vulnerability in Jenkins agent names
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override unrelated `config.xml` files. If the global `config.xml` file is replaced, Jenkins will start up with unsafe legacy defaults after a restart.
Jenkins 2.275, LTS 2.263.2 ensures that agent names are considered valid names for items to prevent this problem.
In case of problems, this change can be reverted by setting the [Java system property](https://www.jenkins.io/doc/book/managing/system-properties/) `jenkins.model.Nodes.enforceNameRestrictions` to `false`. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21605 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63218 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63128 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63187 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63217 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63182 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63234 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63252 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63269 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63254 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21605 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21605, GHSA-pxgq-gqr9-5gwx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rrnb-9h1s-vkef |
|
|