CVE-2026-33002

Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*

History

21 Mar 2026, 00:18

Type Values Removed Values Added
References () https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3674 - () https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3674 - Vendor Advisory
CPE cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
First Time Jenkins jenkins
Jenkins

19 Mar 2026, 15:16

Type Values Removed Values Added
CWE CWE-350
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

18 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-18 16:16

Updated : 2026-03-21 00:18


NVD link : CVE-2026-33002

Mitre link : CVE-2026-33002

CVE.ORG link : CVE-2026-33002


JSON object : View

Products Affected

jenkins

  • jenkins
CWE
CWE-350

Reliance on Reverse DNS Resolution for a Security-Critical Action