Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jenkins-ci.main/jenkins-core@2.555
Typemaven
Namespaceorg.jenkins-ci.main
Namejenkins-core
Version2.555
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-22rc-z7ra-dfh8
vulnerability_id VCID-22rc-z7ra-dfh8
summary
Jenkins has a link following vulnerability allows arbitrary file creation
Jenkins 2.554 and earlier, LTS 2.541.2 and earlier does not safely handle symbolic links during the extraction of .tar and .tar.gz archives, allowing crafted archives to write files to arbitrary locations on the filesystem, restricted only by file system access permissions of the user running Jenkins.
This can be exploited to deploy malicious scripts or plugins on the controller by attackers with Item/Configure permission, or able to control agent processes.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33001.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33001
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30832
published_at 2026-04-11T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.3083
published_at 2026-04-09T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30798
published_at 2026-04-08T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.3074
published_at 2026-04-07T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.3092
published_at 2026-04-04T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30873
published_at 2026-04-02T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31441
published_at 2026-04-16T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31407
published_at 2026-04-13T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31444
published_at 2026-04-12T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31419
published_at 2026-04-18T12:55:00Z
10
value 0.00142
scoring_system epss
scoring_elements 0.33984
published_at 2026-04-24T12:55:00Z
11
value 0.00142
scoring_system epss
scoring_elements 0.34356
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33001
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/6dc99937605d5bddfeaae43a4cd14c2571e23adc
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/6dc99937605d5bddfeaae43a4cd14c2571e23adc
4
reference_url https://github.com/jenkinsci/jenkins/releases/tag/jenkins-2.555
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/releases/tag/jenkins-2.555
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-33001
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-33001
6
reference_url https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-19T03:55:23Z/
url https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3657
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448645
reference_id 2448645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448645
8
reference_url https://github.com/advisories/GHSA-r6qv-frpc-q66c
reference_id GHSA-r6qv-frpc-q66c
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r6qv-frpc-q66c
9
reference_url https://access.redhat.com/errata/RHSA-2026:10199
reference_id RHSA-2026:10199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10199
10
reference_url https://access.redhat.com/errata/RHSA-2026:10201
reference_id RHSA-2026:10201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10201
11
reference_url https://access.redhat.com/errata/RHSA-2026:10204
reference_id RHSA-2026:10204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10204
12
reference_url https://access.redhat.com/errata/RHSA-2026:10205
reference_id RHSA-2026:10205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10205
13
reference_url https://access.redhat.com/errata/RHSA-2026:10206
reference_id RHSA-2026:10206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10206
14
reference_url https://access.redhat.com/errata/RHSA-2026:10209
reference_id RHSA-2026:10209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10209
15
reference_url https://access.redhat.com/errata/RHSA-2026:10211
reference_id RHSA-2026:10211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10211
16
reference_url https://access.redhat.com/errata/RHSA-2026:10213
reference_id RHSA-2026:10213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10213
17
reference_url https://access.redhat.com/errata/RHSA-2026:10214
reference_id RHSA-2026:10214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10214
18
reference_url https://access.redhat.com/errata/RHSA-2026:10215
reference_id RHSA-2026:10215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10215
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.555
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.555
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.555
aliases CVE-2026-33001, GHSA-r6qv-frpc-q66c
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-22rc-z7ra-dfh8
1
url VCID-as34-f89r-e7ck
vulnerability_id VCID-as34-f89r-e7ck
summary
Jenkins has a DNS rebinding vulnerability in WebSocket CLI origin validation
Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33002.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33002.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33002
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14641
published_at 2026-04-08T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14661
published_at 2026-04-11T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14744
published_at 2026-04-04T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14552
published_at 2026-04-07T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.147
published_at 2026-04-09T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14462
published_at 2026-04-18T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14458
published_at 2026-04-16T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14567
published_at 2026-04-13T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14623
published_at 2026-04-12T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.1467
published_at 2026-04-02T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.16099
published_at 2026-04-21T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15994
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33002
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/348666da7136ef8270f88c0a7350562b0ba7f8ce
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/348666da7136ef8270f88c0a7350562b0ba7f8ce
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-33002
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-33002
5
reference_url https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3674
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-19T14:43:30Z/
url https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3674
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448643
reference_id 2448643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448643
7
reference_url https://github.com/advisories/GHSA-phhv-63fh-rrc8
reference_id GHSA-phhv-63fh-rrc8
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-phhv-63fh-rrc8
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.555
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.555
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.555
aliases CVE-2026-33002, GHSA-phhv-63fh-rrc8
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-as34-f89r-e7ck
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.555