Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-db62-2h4q-x7fv
Vulnerability ID VCID-db62-2h4q-x7fv
Aliases CVE-2021-21604
GHSA-qv6f-rcv6-6q3x
Summary Improper handling of REST API XML deserialization errors in Jenkins Jenkins provides XML REST APIs to configure views, jobs, and other items. When deserialization fails because of invalid data, Jenkins 2.274 and earlier, LTS 2.263.1 and earlier stores invalid object references created through these endpoints in the Old Data Monitor. If an administrator discards the old data, some erroneous data submitted to these endpoints may be persisted. This allows attackers with View/Create, Job/Create, Agent/Create, or their respective */Configure permissions to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects when discarded by an administrator.\n\nJenkins 2.275, LTS 2.263.2 does not record submissions from users in Old Data Monitor anymore. In case of problems, the [Java system properties](https://www.jenkins.io/doc/book/managing/system-properties/) `hudson.util.RobustReflectionConverter.recordFailuresForAdmins` and `hudson.util.RobustReflectionConverter.recordFailuresForAllAuthentications` can be set to true to record configuration data submissions from administrators or all users, partially or completely disabling this fix.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 8.0 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21604.json
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
epss 0.00835 https://api.first.org/data/v1/epss?cve=CVE-2021-21604
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-qv6f-rcv6-6q3x
cvssv3.1 8.0 https://github.com/jenkinsci/jenkins
generic_textual HIGH https://github.com/jenkinsci/jenkins
cvssv3.1 8.0 https://github.com/jenkinsci/jenkins/commit/f1056bd814fc1f19ea241a101d649b8c143807e7
generic_textual HIGH https://github.com/jenkinsci/jenkins/commit/f1056bd814fc1f19ea241a101d649b8c143807e7
cvssv3.1 8.0 https://nvd.nist.gov/vuln/detail/CVE-2021-21604
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2021-21604
archlinux High https://security.archlinux.org/AVG-1446
cvssv3.1 8.0 https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-1923
generic_textual HIGH https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-1923
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21604.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/jenkinsci/jenkins
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/jenkinsci/jenkins/commit/f1056bd814fc1f19ea241a101d649b8c143807e7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-21604
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-1923
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.74579
EPSS Score 0.00835
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:08:42.249840+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qv6f-rcv6-6q3x/GHSA-qv6f-rcv6-6q3x.json 38.0.0