Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jenkins-ci.main/jenkins-core
  4. ›
  5. CVE-2026-27100

CVE-2026-27100: Jenkins has a build information disclosure vulnerability through Run Parameter

February 18, 2026 (updated February 25, 2026)

Jenkins 2.550 and earlier, LTS 2.541.1 and earlier accepts Run Parameter values that refer to builds the user submitting the build does not have access to, allowing attackers with Item/Build and Item/Configure permission to obtain information about the existence of jobs, the existence of builds, and if a specified build exists, its display name.

References

  • github.com/advisories/GHSA-wfhp-qgm8-5p5c
  • github.com/jenkinsci/jenkins
  • github.com/jenkinsci/jenkins/commit/f92eadb5813f04ca27439455e2573c3171e93a45
  • github.com/jenkinsci/jenkins/releases/tag/jenkins-2.541.2
  • github.com/jenkinsci/jenkins/releases/tag/jenkins-2.551
  • nvd.nist.gov/vuln/detail/CVE-2026-27100
  • www.jenkins.io/security/advisory/2026-02-18/

Code Behaviors & Features

Detect and mitigate CVE-2026-27100 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.541.2, all versions starting from 2.542 before 2.551

Fixed versions

  • 2.551
  • 2.541.2

Solution

Upgrade to versions 2.541.2, 2.551 or above.

Impact 4.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

maven/org.jenkins-ci.main/jenkins-core/CVE-2026-27100.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 25 Mar 2026 00:16:59 +0000.