Search for vulnerabilities
Vulnerability details: VCID-p4qu-j32k-47hf
Vulnerability ID VCID-p4qu-j32k-47hf
Aliases CVE-2021-21685
GHSA-58xm-mxjf-254g
Summary multiple issues
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 9.0 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21685.json
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2021-21685
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2021-21685
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2021-21685
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-58xm-mxjf-254g
cvssv3.1 9.0 https://github.com/jenkinsci/jenkins
generic_textual CRITICAL https://github.com/jenkinsci/jenkins
cvssv3.1 9.0 https://github.com/jenkinsci/jenkins/commit/104c751d907919dd53f5090f84d53c671a66457b
generic_textual CRITICAL https://github.com/jenkinsci/jenkins/commit/104c751d907919dd53f5090f84d53c671a66457b
cvssv3.1 9.0 https://github.com/jenkinsci/jenkins/commit/5a245e42979abe4a26d41727c839521e36cedd74
generic_textual CRITICAL https://github.com/jenkinsci/jenkins/commit/5a245e42979abe4a26d41727c839521e36cedd74
cvssv3.1 9.0 https://github.com/jenkinsci/jenkins/commit/63cde2daadc705edf086f2213b48c8c547f98358
generic_textual CRITICAL https://github.com/jenkinsci/jenkins/commit/63cde2daadc705edf086f2213b48c8c547f98358
cvssv3.1 9.0 https://nvd.nist.gov/vuln/detail/CVE-2021-21685
generic_textual CRITICAL https://nvd.nist.gov/vuln/detail/CVE-2021-21685
archlinux Critical https://security.archlinux.org/AVG-2526
cvssv3.1 9.0 https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455
generic_textual CRITICAL https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455
cvssv3.1 9.0 http://www.openwall.com/lists/oss-security/2021/11/04/3
generic_textual CRITICAL http://www.openwall.com/lists/oss-security/2021/11/04/3
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21685.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/jenkinsci/jenkins
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/jenkinsci/jenkins/commit/104c751d907919dd53f5090f84d53c671a66457b
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/jenkinsci/jenkins/commit/5a245e42979abe4a26d41727c839521e36cedd74
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/jenkinsci/jenkins/commit/63cde2daadc705edf086f2213b48c8c547f98358
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-21685
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2021/11/04/3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.45985
EPSS Score 0.00232
Published At June 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-01T11:52:45.474372+00:00 Arch Linux Importer Import https://security.archlinux.org/AVG-2526 36.1.3