CVE-2026-42520

Jenkins Credentials Binding Plugin 719.v80e905ef14eb_ and earlier does not sanitize file names for file and zip file credentials, allowing attackers able to provide credentials to a job to write files to arbitrary locations on the node filesystem, which can lead to remote code execution if Jenkins is configured to allow a low-privileged user to configure file or zip file credentials used for a job running on the built-in node.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:credentials_binding:*:*:*:*:*:jenkins:*:*

History

06 May 2026, 16:32

Type Values Removed Values Added
First Time Jenkins credentials Binding
Jenkins
CPE cpe:2.3:a:jenkins:credentials_binding:*:*:*:*:*:jenkins:*:*
References () https://www.jenkins.io/security/advisory/2026-04-29/#SECURITY-3672 - () https://www.jenkins.io/security/advisory/2026-04-29/#SECURITY-3672 - Vendor Advisory

30 Apr 2026, 15:11

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-29 14:16

Updated : 2026-05-06 16:32


NVD link : CVE-2026-42520

Mitre link : CVE-2026-42520

CVE.ORG link : CVE-2026-42520


JSON object : View

Products Affected

jenkins

  • credentials_binding
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')