Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-phhv-63fh-rrc8 | Jenkins has a DNS rebinding vulnerability in WebSocket CLI origin validation |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-350 | |
| Metrics |
cvssV3_1
|
ssvc
|
Thu, 19 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | jenkins: Jenkins: Origin validation bypass via DNS rebinding in CLI WebSocket endpoint | |
| Weaknesses | CWE-346 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 19 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins Project
Jenkins Project jenkins |
|
| Vendors & Products |
Jenkins Project
Jenkins Project jenkins |
Wed, 18 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2026-03-19T14:45:46.878Z
Reserved: 2026-03-17T15:04:07.616Z
Link: CVE-2026-33002
Updated: 2026-03-19T14:45:24.513Z
Status : Awaiting Analysis
Published: 2026-03-18T16:16:28.187
Modified: 2026-03-19T15:16:27.750
Link: CVE-2026-33002
OpenCVE Enrichment
Updated: 2026-03-19T08:56:35Z
Github GHSA