Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-s5qz-aqj7-6uhz
Vulnerability ID VCID-s5qz-aqj7-6uhz
Aliases CVE-2019-10320
GHSA-xm94-9jw8-p6hw
Summary File and Directory Information Exposure Jenkins Credentials Plugin allows users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
cvssv3.1 4.3 https://access.redhat.com/errata/RHBA-2019:1605
generic_textual MODERATE https://access.redhat.com/errata/RHBA-2019:1605
cvssv3.1 4.3 https://access.redhat.com/errata/RHSA-2019:1636
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2019:1636
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10320.json
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00111 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
epss 0.00116 https://api.first.org/data/v1/epss?cve=CVE-2019-10320
cvssv3.1 4.3 http://seclists.org/fulldisclosure/2019/May/39
generic_textual MODERATE http://seclists.org/fulldisclosure/2019/May/39
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-xm94-9jw8-p6hw
cvssv3.1 4.3 https://github.com/jenkinsci/credentials-plugin/commit/40d0b5cc53c265b601ffaa4469310fad390a80fb
generic_textual MODERATE https://github.com/jenkinsci/credentials-plugin/commit/40d0b5cc53c265b601ffaa4469310fad390a80fb
cvssv3.1 4.3 https://jenkins.io/security/advisory/2019-05-21/#SECURITY-1322
generic_textual MODERATE https://jenkins.io/security/advisory/2019-05-21/#SECURITY-1322
cvssv3.1 4.3 https://nvd.nist.gov/vuln/detail/CVE-2019-10320
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2019-10320
cvssv3.1 4.3 https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320
generic_textual MODERATE https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320
cvssv3.1 4.3 http://www.openwall.com/lists/oss-security/2019/05/21/1
generic_textual MODERATE http://www.openwall.com/lists/oss-security/2019/05/21/1
cvssv3.1 4.3 http://www.securityfocus.com/bid/108462
generic_textual MODERATE http://www.securityfocus.com/bid/108462
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/errata/RHBA-2019:1605
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2019:1636
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10320.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at http://seclists.org/fulldisclosure/2019/May/39
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/jenkinsci/credentials-plugin/commit/40d0b5cc53c265b601ffaa4469310fad390a80fb
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at https://jenkins.io/security/advisory/2019-05-21/#SECURITY-1322
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-10320
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at http://www.openwall.com/lists/oss-security/2019/05/21/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Found at http://www.securityfocus.com/bid/108462
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.29495
EPSS Score 0.00111
Published At April 21, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:48:28.972618+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.plugins/credentials/CVE-2019-10320.yml 38.0.0