vulnerability
Jenkins Advisory 2023-06-14: CVE-2023-35141: CSRF protection bypass vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:S/C:C/I:C/A:C) | Jun 15, 2023 | Jun 15, 2023 | Aug 11, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:S/C:C/I:C/A:C)
Published
Jun 15, 2023
Added
Jun 15, 2023
Modified
Aug 11, 2025
Description
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
Solutions
jenkins-lts-upgrade-2_401_1jenkins-upgrade-2_400
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.