Jenkins Cross-Site WebSocket Hijacking

critical Web App Scanning Plugin ID 114964

Synopsis

Jenkins Cross-Site WebSocket Hijacking

Description

A vulnerability exists in Jenkins versions from 2.217 before 2.442 and from LTS 2.222.1 before LTS 2.426.3 allowing an unauthenticated and remote attacker to trick a user authenticated on the target Jenkins instance and perform Jenkins CLI cross-site arbitrary commands through websockets.

Solution

Upgrade to Jenkins version 2.442, LTS 2.426.3 or later.

See Also

https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3315

Plugin Details

Severity: Critical

ID: 114964

Type: remote

Published: 9/19/2025

Updated: 9/19/2025

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-23898

CVSS v3

Risk Factor: High

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2024-23898

CVSS v4

Risk Factor: Critical

Base Score: 9.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CVSS Score Source: Tenable

Vulnerability Information

CPE: cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/24/2024

Vulnerability Publication Date: 1/22/2024

Reference Information

CVE: CVE-2024-23898