Browse all 1473 CVE security advisories affecting Jenkins Project. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Jenkins is an open-source automation server primarily used for continuous integration and continuous delivery (CI/CD) pipelines. As a widely adopted tool in software development, it facilitates the building, testing, and deployment of code. Historically, the platform has been susceptible to numerous security flaws, with over 1,400 Common Vulnerabilities and Exposures (CVEs) recorded. These vulnerabilities frequently involve remote code execution (RCE), cross-site scripting (XSS), and privilege escalation, often stemming from insecure default configurations or improper input validation. A notable incident occurred in 2019 when a critical RCE flaw allowed attackers to execute arbitrary commands on build agents. The Jenkins project has since implemented stricter security defaults and improved access controls to mitigate these risks. Despite these efforts, the sheer volume of historical CVEs highlights the complexity of securing a long-standing, feature-rich automation ecosystem, requiring diligent maintenance and configuration management by administrators to ensure robust protection against potential exploits.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-23107 | Jenkins Warnings Next Generation 路径遍历漏洞 — Jenkins Warnings Next Generation Plugin | 8.1 | - | 2022-01-12 |
| CVE-2022-23105 | Jenkins 安全漏洞 — Jenkins Active Directory Plugin | 7.5 | - | 2022-01-12 |
| CVE-2022-20621 | Jenkins 安全漏洞 — Jenkins Metrics Plugin | 3.3 | - | 2022-01-12 |
| CVE-2022-20620 | Jenkins SSH Agent Plugin 权限许可和访问控制问题漏洞 — Jenkins SSH Agent Plugin | 4.3 | - | 2022-01-12 |
| CVE-2022-20619 | Jenkins Plugin 跨站请求伪造漏洞 — Jenkins Bitbucket Branch Source Plugin | 8.8 | - | 2022-01-12 |
| CVE-2022-20618 | Jenkins Plugin 权限许可和访问控制问题漏洞 — Jenkins Bitbucket Branch Source Plugin | 4.3 | - | 2022-01-12 |
| CVE-2022-20617 | Jenkins 插件 操作系统命令注入漏洞 — Jenkins Docker Commons Plugin | 8.8 | - | 2022-01-12 |
| CVE-2022-20616 | Jenkins 插件 权限许可和访问控制问题漏洞 — Jenkins Credentials Binding Plugin | 4.3 | - | 2022-01-12 |
| CVE-2022-20615 | Jenkins Plugin 跨站脚本漏洞 — Jenkins Matrix Project Plugin | 5.4 | - | 2022-01-12 |
| CVE-2022-20612 | Jenkins 跨站请求伪造漏洞 — Jenkins | 4.3 | - | 2022-01-12 |
| CVE-2022-20613 | Jenkins Plugin 跨站请求伪造漏洞 — Jenkins Mailer Plugin | 4.3 | - | 2022-01-12 |
| CVE-2022-20614 | Jenkins Plugin 权限许可和访问控制问题漏洞 — Jenkins Mailer Plugin | 4.3 | - | 2022-01-12 |
| CVE-2022-23106 | Jenkins 安全漏洞 — Jenkins Configuration as Code Plugin | 4.3 | - | 2022-01-12 |
| CVE-2021-43578 | Jenkins 安全漏洞 — Jenkins Squash TM Publisher (Squash4Jenkins) Plugin | 9.1 | - | 2021-11-12 |
| CVE-2021-43577 | Jenkins 代码问题漏洞 — Jenkins OWASP Dependency-Check Plugin | 9.1 | - | 2021-11-12 |
| CVE-2021-43576 | Jenkins 代码问题漏洞 — Jenkins pom2config Plugin | 6.5 | - | 2021-11-12 |
| CVE-2021-21701 | Jenkins 代码问题漏洞 — Jenkins Performance Plugin | 8.1 | - | 2021-11-12 |
| CVE-2021-21700 | Jenkins 跨站脚本漏洞 — Jenkins Scriptler Plugin | 5.4 | - | 2021-11-12 |
| CVE-2021-21699 | Jenkins Active Choices 跨站脚本漏洞 — Jenkins Active Choices Plugin | 5.4 | - | 2021-11-12 |
| CVE-2021-21698 | Jenkins 路径遍历漏洞 — Jenkins Subversion Plugin | 8.2 | - | 2021-11-04 |
| CVE-2021-21697 | Jenkins 安全漏洞 — Jenkins | 9.1 | - | 2021-11-04 |
| CVE-2021-21696 | Jenkins 安全漏洞 — Jenkins | 8.8 | - | 2021-11-04 |
| CVE-2021-21695 | Jenkins 后置链接漏洞 — Jenkins | 8.1 | - | 2021-11-04 |
| CVE-2021-21694 | Jenkins 安全漏洞 — Jenkins | 9.8 | - | 2021-11-04 |
| CVE-2021-21692 | Jenkins 安全漏洞 — Jenkins | 9.8 | - | 2021-11-04 |
| CVE-2021-21691 | Jenkins 安全漏洞 — Jenkins | 9.8 | - | 2021-11-04 |
| CVE-2021-21690 | Jenkins 安全漏洞 — Jenkins | 9.8 | - | 2021-11-04 |
| CVE-2021-21689 | Jenkins 安全漏洞 — Jenkins | 9.8 | - | 2021-11-04 |
| CVE-2021-21688 | Jenkins 安全漏洞 — Jenkins | 6.5 | - | 2021-11-04 |
| CVE-2021-21687 | Jenkins 安全漏洞 — Jenkins | 9.1 | - | 2021-11-04 |
This page lists every published CVE security advisory associated with Jenkins Project. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.