Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jenkins-ci.main/jenkins-core
  4. ›
  5. CVE-2026-27099

CVE-2026-27099: Jenkins has a stored XSS vulnerability in node offline cause description

February 18, 2026 (updated February 25, 2026)

Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the “Mark temporarily offline” offline cause, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure or Agent/Disconnect permission.

References

  • github.com/advisories/GHSA-85h6-5m3v-gx37
  • github.com/jenkinsci/jenkins
  • github.com/jenkinsci/jenkins/commit/578c028e2cdfdc9e124d0ca389a80bb2bd231ab2
  • github.com/jenkinsci/jenkins/releases/tag/jenkins-2.541.2
  • github.com/jenkinsci/jenkins/releases/tag/jenkins-2.551
  • nvd.nist.gov/vuln/detail/CVE-2026-27099
  • www.jenkins.io/security/advisory/2026-02-18/

Code Behaviors & Features

Detect and mitigate CVE-2026-27099 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.483 before 2.541.2, all versions starting from 2.542 before 2.551

Fixed versions

  • 2.551
  • 2.541.2

Solution

Upgrade to versions 2.541.2, 2.551 or above.

Impact 8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

maven/org.jenkins-ci.main/jenkins-core/CVE-2026-27099.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 25 Mar 2026 00:18:20 +0000.