Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation.
References
| Link | Resource |
|---|---|
| https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3674 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Mar 2026, 00:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.jenkins.io/security/advisory/2026-03-18/#SECURITY-3674 - Vendor Advisory | |
| CPE | cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:* cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:* |
|
| First Time |
Jenkins jenkins
Jenkins |
19 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-350 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
18 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-18 16:16
Updated : 2026-03-21 00:18
NVD link : CVE-2026-33002
Mitre link : CVE-2026-33002
CVE.ORG link : CVE-2026-33002
JSON object : View
Products Affected
jenkins
- jenkins
CWE
CWE-350
Reliance on Reverse DNS Resolution for a Security-Critical Action
