Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-as34-f89r-e7ck |
| Summary | Jenkins has a DNS rebinding vulnerability in WebSocket CLI origin validation
Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation. |
| Aliases |
| 0 |
|
| 1 |
| alias |
GHSA-phhv-63fh-rrc8 |
|
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33002 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14641 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14661 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14744 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14552 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.147 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14462 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14458 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14567 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14623 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.1467 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16099 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15994 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33002 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
346 |
| name |
Origin Validation Error |
| description |
The product does not properly verify that the source of data or communication is valid. |
|
| 1 |
| cwe_id |
350 |
| name |
Reliance on Reverse DNS Resolution for a Security-Critical Action |
| description |
The product performs reverse DNS resolution on an IP address to obtain the hostname and make a security decision, but it does not properly ensure that the IP address is truly associated with the hostname. |
|
| 2 |
| cwe_id |
937 |
| name |
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013. |
|
| 3 |
| cwe_id |
1035 |
| name |
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017. |
|
|
| Exploits |
|
| Severity_range_score | 5.9 - 8.9 |
| Exploitability | 0.5 |
| Weighted_severity | 8.0 |
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-as34-f89r-e7ck |