Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-dvyn-m8js-xbc2
Vulnerability ID VCID-dvyn-m8js-xbc2
Aliases CVE-2023-27901
GHSA-h76p-mc68-jv3p
Summary Allocation of Resources Without Limits or Throttling Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27901.json
epss 0.00622 https://api.first.org/data/v1/epss?cve=CVE-2023-27901
epss 0.00622 https://api.first.org/data/v1/epss?cve=CVE-2023-27901
epss 0.00622 https://api.first.org/data/v1/epss?cve=CVE-2023-27901
epss 0.00622 https://api.first.org/data/v1/epss?cve=CVE-2023-27901
epss 0.00622 https://api.first.org/data/v1/epss?cve=CVE-2023-27901
epss 0.00622 https://api.first.org/data/v1/epss?cve=CVE-2023-27901
epss 0.00622 https://api.first.org/data/v1/epss?cve=CVE-2023-27901
epss 0.00622 https://api.first.org/data/v1/epss?cve=CVE-2023-27901
epss 0.00622 https://api.first.org/data/v1/epss?cve=CVE-2023-27901
epss 0.00622 https://api.first.org/data/v1/epss?cve=CVE-2023-27901
epss 0.00622 https://api.first.org/data/v1/epss?cve=CVE-2023-27901
epss 0.00622 https://api.first.org/data/v1/epss?cve=CVE-2023-27901
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-h76p-mc68-jv3p
cvssv3.1 7.5 https://github.com/CVEProject/cvelist/blob/master/2023/27xxx/CVE-2023-27901.json
generic_textual HIGH https://github.com/CVEProject/cvelist/blob/master/2023/27xxx/CVE-2023-27901.json
cvssv3.1 7.5 https://github.com/jenkinsci/jenkins/commit/b70f4cb5892bd6059a45b5f156f019ce572adb08
generic_textual HIGH https://github.com/jenkinsci/jenkins/commit/b70f4cb5892bd6059a45b5f156f019ce572adb08
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2023-27901
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2023-27901
cvssv3.1 7.5 https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3030
generic_textual HIGH https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3030
ssvc Track https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3030
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27901.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/CVEProject/cvelist/blob/master/2023/27xxx/CVE-2023-27901.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/jenkinsci/jenkins/commit/b70f4cb5892bd6059a45b5f156f019ce572adb08
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-27901
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3030
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-28T18:44:36Z/ Found at https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3030
Exploit Prediction Scoring System (EPSS)
Percentile 0.70044
EPSS Score 0.00622
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:51:00.156481+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.main/jenkins-core/CVE-2023-27901.yml 38.0.0