vulnerability
Jenkins Advisory 2016-02-24: CVE-2016-0792: Remote code execution through remote API
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | Apr 7, 2016 | Nov 13, 2017 | Mar 27, 2026 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Apr 7, 2016
Added
Nov 13, 2017
Modified
Mar 27, 2026
Description
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
Solutions
jenkins-lts-upgrade-1_642_2jenkins-upgrade-1_650
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.