Jenkins plugins Multiple Vulnerabilities (2026-04-29)

high Nessus Plugin ID 310885

Synopsis

An application running on a remote web server host is affected by multiple vulnerabilities

Description

According to their self-reported version numbers, the version of Jenkins plugins running on the remote web server are affected by multiple vulnerabilities:

- High HTML Publisher Plugin 427 and earlier does not escape job name and URL in the legacy wrapper file.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. HTML Publisher Plugin 427.1 escapes job name and URL when generating the legacy wrapper file. This fix only applies to newly generated wrappers. On Jenkins 2.539 and newer, LTS 2.541.1 and newer, enforcing Content Security Policy protection mitigates this vulnerability. This vulnerability has been reported through the Jenkins Bug Bounty Program sponsored by the European Commission.
(CVE-2026-42524)

- Medium Script Security Plugin 1399.ve6a_66547f6e1 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to enumerate pending and approved Script Security classpaths. Script Security Plugin 1402.v94c9ce464861 requires Overall/Administer permission to enumerate pending and approved Script Security classpaths. This vulnerability has been reported through the Jenkins Bug Bounty Program sponsored by the European Commission. (CVE-2026-42519)

- High Credentials Binding Plugin 719.v80e905ef14eb_ and earlier does not sanitize file names for file and zip file credentials. This allows attackers able to provide credentials to a job to write files to arbitrary locations on the node filesystem. If Jenkins is configured to allow a low-privileged user to configure file or zip file credentials used for a job running on the built-in node, this can lead to remote code execution. Credentials Binding Plugin 720.v3f6decef43ea_ sanitizes the file name provided for file and zip file credentials, preventing path traversal. This vulnerability has been reported through the Jenkins Bug Bounty Program sponsored by the European Commission. (CVE-2026-42520)

- Medium Matrix Authorization Strategy Plugin 2.0-beta-1 through 3.2.9 (both inclusive) invokes parameterless constructors of classes specified in configuration when deserializing inheritance strategies, without restricting the classes that can be instantiated. This can be abused by attackers with Item/Configure permission to instantiate arbitrary types, which may lead to information disclosure or other impacts depending on the classes available on the classpath. Matrix Authorization Strategy Plugin 3.2.10 verifies that the class being instantiated is an inheritance strategy implementation, preventing instantiation of arbitrary types. This vulnerability has been reported through the Jenkins Bug Bounty Program sponsored by the European Commission. (CVE-2026-42521)

- Medium GitHub Branch Source Plugin 1967.vdea_d580c1a_b_a_ and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL with attacker-specified GitHub App credentials. GitHub Branch Source Plugin 1967.1969.v205fd594c821 requires Overall/Manage permission to perform the connection test. This vulnerability has been reported through the Jenkins Bug Bounty Program sponsored by the European Commission. (CVE-2026-42522)

- High GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature GitHub hook trigger for GITScm polling. This results in a stored cross-site scripting (XSS) vulnerability exploitable by non-anonymous attackers with Overall/Read permission. GitHub Plugin 1.46.0.1 no longer processes the current job URL as part of JavaScript implementing validation of the feature GitHub hook trigger for GITScm polling. This vulnerability has been reported through the Jenkins Bug Bounty Program sponsored by the European Commission.
(CVE-2026-42523)

- Medium Microsoft Entra ID (previously Azure AD) Plugin 666.v6060de32f87d and earlier does not restrict the redirect URL after login. This allows attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site after successful authentication. Microsoft Entra ID (previously Azure AD) Plugin 667.v4c5827a_e74a_0 only redirects to relative (Jenkins) URLs.
(CVE-2026-42525)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update Jenkins plugins to the following versions:
- Credentials Binding Plugin to version 720.v3f6decef43ea_ or later
- GitHub Branch Source Plugin to version 1967.1969.v205fd594c821 or later
- GitHub Plugin to version 1.46.0.1 or later
- HTML Publisher Plugin to version 427.1 or later
- Matrix Authorization Strategy Plugin to version 3.2.10 or later
- Microsoft Entra ID (previously Azure AD) Plugin to version 667.v4c5827a_e74a_0 or later
- Script Security Plugin to version 1402.v94c9ce464861 or later

See vendor advisory for more details.

See Also

https://jenkins.io/security/advisory/2026-04-29

Plugin Details

Severity: High

ID: 310885

File Name: jenkins_security_advisory_2026-04-29_plugins.nasl

Version: 1.1

Type: Combined

Agent: windows, macosx, unix

Family: CGI abuses

Published: 4/29/2026

Updated: 4/29/2026

Configuration: Enable thorough checks (optional)

Supported Sensors: Nessus Agent, Nessus

Enable CGI Scanning: true

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2026-42524

CVSS v3

Risk Factor: High

Base Score: 8

Temporal Score: 7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cloudbees:jenkins, cpe:/a:jenkins:jenkins

Required KB Items: installed_sw/Jenkins

Exploit Ease: No known exploits are available

Patch Publication Date: 4/29/2026

Vulnerability Publication Date: 4/29/2026

Reference Information

CVE: CVE-2026-42519, CVE-2026-42520, CVE-2026-42521, CVE-2026-42522, CVE-2026-42523, CVE-2026-42524, CVE-2026-42525