CVE-2026-42519
Received Received - Intake
Missing Permission Check in Jenkins Script Security Plugin

Publication date: 2026-04-29

Last updated on: 2026-05-06

Assigner: Jenkins Project

Description
A missing permission check in Jenkins Script Security Plugin 1399.ve6a_66547f6e1 and earlier allows attackers with Overall/Read permission to enumerate pending and approved Script Security classpaths.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-29
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-04-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
jenkins script_security to 1399.ve6a_66547f6e1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a missing permission check in the Jenkins Script Security Plugin versions 1399.ve6a_66547f6e1 and earlier. It allows attackers who have Overall/Read permission to enumerate pending and approved Script Security classpaths through an HTTP endpoint.


How can this vulnerability impact me? :

An attacker with Overall/Read permission can exploit this vulnerability to gain information about pending and approved Script Security classpaths. This could potentially aid in further attacks or unauthorized access by revealing internal details about the Jenkins environment.


Can you explain this vulnerability to me?

This vulnerability is a missing permission check in the Jenkins Script Security Plugin version 1399.ve6a_66547f6e1 and earlier. It allows attackers who have Overall/Read permission to enumerate pending and approved Script Security classpaths.


How can this vulnerability impact me? :

The vulnerability allows users with limited permissions (Overall/Read) to access information about pending and approved Script Security classpaths, which they normally should not be able to see. This could potentially expose sensitive internal details about scripts and their security status within Jenkins.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a missing permission check in an HTTP endpoint of the Jenkins Script Security Plugin, allowing enumeration of pending and approved Script Security classpaths by users with Overall/Read permission.

Detection would involve monitoring HTTP requests to the Jenkins Script Security Plugin endpoints to identify attempts to enumerate classpaths without proper permissions.

Specific commands or detection scripts are not provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Jenkins Script Security Plugin to version 1402.v94c9ce464861 or later.

This update includes a fix that enforces Overall/Administer permission to perform enumerations of Script Security classpaths, preventing unauthorized enumeration by users with only Overall/Read permission.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a missing permission check in an HTTP endpoint of the Jenkins Script Security Plugin, allowing enumeration of pending and approved Script Security classpaths by users with Overall/Read permission.

To detect this vulnerability on your system, you can check the version of the Script Security Plugin installed in your Jenkins instance. Versions 1399.ve6a_66547f6e1 and earlier are vulnerable.

You can use Jenkins API or CLI commands to query the plugin version. For example, using curl to query the plugin manager API endpoint:

  • curl -s -u <user>:<api_token> https://<jenkins_url>/pluginManager/api/json?depth=1 | grep script-security

If the version returned is 1399.ve6a_66547f6e1 or earlier, your system is vulnerable.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Jenkins Script Security Plugin to version 1402.v94c9ce464861 or later.

This update includes a fix that enforces Overall/Administer permission to enumerate pending and approved Script Security classpaths, preventing unauthorized enumeration.

Additionally, review and restrict user permissions to ensure that only trusted users have Overall/Read or higher permissions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart